Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 3 May 2022

Elissavet-Anna Valvi

The aim of the present study is to shed light on the role of legal practitioners, namely, lawyers and notaries, in the fight against money laundering: Are they considered as…

3173

Abstract

Purpose

The aim of the present study is to shed light on the role of legal practitioners, namely, lawyers and notaries, in the fight against money laundering: Are they considered as facilitators or obstacles against money laundering? How does the global and the EU legal framework deal with the legal professionals?

Design/methodology/approach

The research follows a deductive approach attempting to respond to questions such as: How do the lawyers’ and notaries’ societies react in front of the anti-money laundering measures that concern them and why? What are the discrepancies between the lawyers’ professional secrecy and the obligations that EU anti-money laundering legislation assigns them?

Findings

This study disclosures the response of the European union and international legal and regulatory framework as well as the reflexes of the international and European legal professionals’ associations to this danger. It also demonstrates the reaction of lawyers against European union anti-money laundering legislation, to the point that it limits not only the confidentiality principle but also the position of the European judicial systems to the contradiction between this principle and the lawyers’ obligation to report their suspicions to the authorities.

Research limitations/implications

To fulfil the study goals, it was necessary to overcome some obstacles, like the limitation of existing sources. Indeed, transnational empirical research considering the professionals who facilitate money laundering is narrow. Besides, policymakers and academics only recently expressed more interest in money laundering and its facilitators.

Originality/value

This paper fulfils an identified need to study the legal professionals’ role not only in money laundering practices but also in anti-money laundering policies.

Open Access
Article
Publication date: 11 April 2016

Denise L. Anthony and Timothy Stablein

The purpose of this paper is to explore different health care professionals’ discourse about privacy – its definition and importance in health care, and its role in their…

13771

Abstract

Purpose

The purpose of this paper is to explore different health care professionals’ discourse about privacy – its definition and importance in health care, and its role in their day-to-day work. Professionals’ discourse about privacy reveals how new technologies and laws challenge existing practices of information control within and between professional groups in health care, with implications not only for patient privacy, but also for the role of information control in professions more generally.

Design/methodology/approach

The authors conducted in-depth, semi-structured interviews with n=83 doctors, nurses, and health information professionals in two academic medical centers and one veteran’s administration hospital/clinic in the Northeastern USA. Interview responses were qualitatively coded for themes and patterns across groups were identified.

Findings

The health care providers and the authors studied actively sought to uphold the protection (and control) of patient information through professional ethics and practices, as well as through the use of technologies and compliance with legal regulations. They used discourses of professionalism, as well as of law and technology, to sometimes accept and sometimes resist changes to practice required in the changing technological and legal context of health care. The authors found differences across professional groups; for some, protection of patient information is part of core professional ethics, while for others it is simply part of their occupational work, aligned with organizational interests.

Research limitations/implications

This qualitative study of physicians, nurses, and health information professionals revealed some differences in views and practices for protecting patient information in the changing technological and legal context of health care that suggest some professional groups (doctors) may be more likely to resist such changes and others (health information professionals) will actively adopt them.

Practical implications

New technologies and regulations are changing how information is used in health care delivery, challenging professional practices for the control of patient information that may change the value or meaning of medical records for different professional groups.

Originality/value

Qualitative findings suggest that professional groups in health care vary in the extent of information control they have, as well in how they view such control. Some groups may be more likely to (be able to) resist changes in the professional control of information that stem from new technologies or regulatory policies. Some professionals recognize that new IT systems and regulations challenge existing social control of information in health care, with the potential to undermine (or possibly bolster) professional self-control for some but not necessarily all occupational groups.

Details

Journal of Health Organization and Management, vol. 30 no. 2
Type: Research Article
ISSN: 1477-7266

Keywords

Open Access
Article
Publication date: 2 June 2022

Marie Eneman

This article aims to describe the personal experience and ethical dilemmas that the author encountered when conducting qualitative research on a highly sensitive topic, i.e…

Abstract

Purpose

This article aims to describe the personal experience and ethical dilemmas that the author encountered when conducting qualitative research on a highly sensitive topic, i.e. interviews with offenders convicted of child pornography.

Design/methodology/approach

This study uses an autoethnographic approach to describe and reflect on my personal experience, emotions and ethical dilemmas when undertaking sensitive research that examines illegal acts.

Findings

Ethical dilemmas and emotional challenges highlighted refer to the issue of access to useful empirical material, conducting interviews with convicted offenders in prison environments, the complexity surrounding confidentiality when interviewing offenders about their criminal activities, vulnerability and insecurity for the researcher and emotional challenges for the researcher when listening to the offenders’ stories describing serious crimes against children.

Originality/value

This article contributes with insights and reflections on conducting qualitative research with a marginalized and stigmatized group in prison environments.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Article
Publication date: 5 August 2019

Ahmed H. Al-Dmour, Masam Abood and Hani H. Al-Dmour

This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting…

6338

Abstract

Purpose

This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting information system (AIS) were being implemented in Jordanian business organizations.

Design/methodology/approach

The study is based on primary data collected through a structured questionnaire from 239 out of 328 shareholdings companies. The survey units were the shareholding companies in Jordan, and the single key respondents approach was adopted. The extents of SysTrust principles were also measured. Previously validated instruments were used where required. The data were analysed using t-test and ANOVA.

Findings

The results indicated that the extent of SysTrust being implemented could be considered to be moderate at this stage. This implies that there are some variations among business organizations in terms of their level of implementing of SysTrust principles and criteria. The results also showed that the extent of SysTrust principles being implemented was varied among business organizations based on their business sector. However, there were not found varied due to their size of business and a length of time in business (experience).

Research limitations/implications

This study is only conducted in Jordan as a developing country. Although Jordan is a valid indicator of prevalent factors in the wider MENA region and developing countries, the lack of external validity of this research means that any generalization of the research findings should be made with caution. Future research can be orientated to other national and cultural settings and compared with the results of this study.

Practical implications

The study provides evidence of the need for management to recognize the importance of the implementation of SysTrust principles and criteria as an internal control for assuring the reliability of AIS within their organizations and be aware which of these principles are appropriate to their size and industry sector.

Originality/value

The findings would be valuable for academic researchers, managers and professional accounting to acquire a better undemanding of the current status of the implementation of the SysTrust principles (i.e., availability, security, integrity processing, confidentiality, and privacy) as an internal control method for assuring the reliability of AIS by testing the phenomenon in Jordan as a developing country.

Details

International Journal of Accounting & Information Management, vol. 27 no. 3
Type: Research Article
ISSN: 1834-7649

Keywords

Open Access
Book part
Publication date: 19 November 2020

Daria Matyushina-Ocheret

Eastern Europe and Central Asia (EECA) is home to 21% of the world’s population of people who inject drugs and it is the region with the fastest-growing HIV epidemic. HIV…

Abstract

Eastern Europe and Central Asia (EECA) is home to 21% of the world’s population of people who inject drugs and it is the region with the fastest-growing HIV epidemic. HIV prevalence among women who inject drugs is significantly higher than among men in EECA. Even in places with high coverage of needle syringe programmes and HIV testing and treatment, women’s access to opioid substitution treatment is lower than men, and women’s sexual and reproductive health needs remain unaddressed. EECA has a unique system of drug registries that store the personal data of people who use drugs. Registration lowers the chances of employment and access to education and for women and increases the risk of losing custody of their children. The system of drug registries contributes to drug-related stigma. Breaches of confidentiality of drug registry data lead to the further marginalisation of women who use drugs. Criminalisation, past experience of police violence and poverty contribute to healthcare access barriers for women. There is a need for legislative changes to improve personal data protection, decriminalise drug use and reduce police violence. The positive effects of these changes would only be seen in the long term. In the interim, women need special access programmes that are designed specifically to address their needs, that provide free-of-charge services and that ensure the safety and confidentiality of personal data.

Details

The Impact of Global Drug Policy on Women: Shifting the Needle
Type: Book
ISBN: 978-1-83982-885-0

Open Access
Article
Publication date: 24 November 2023

Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…

Abstract

Purpose

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).

Design/methodology/approach

This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.

Findings

The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.

Research limitations/implications

The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.

Practical implications

The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.

Originality/value

This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 9 October 2019

Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra and John Sören Pettersson

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent…

3944

Abstract

Purpose

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.

Design/methodology/approach

A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.

Findings

Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.

Practical implications

Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Originality/value

The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 20 December 2018

Patchareewan Jensarikorn, Supavan Phlainoi, Nawarat Phlainoi and Kittipong Saejeng

The purpose of this paper is to assess the situation of accessibility to reproductive health rights, and the conditional factors of accessibility to such rights of adolescents.

1447

Abstract

Purpose

The purpose of this paper is to assess the situation of accessibility to reproductive health rights, and the conditional factors of accessibility to such rights of adolescents.

Design/methodology/approach

A qualitative method was used to extract information from 80 informants. Data were collected through in-depth interview, focus group discussion, observation, data recording, audio recording and the review of related documents during August to October 2016.

Findings

Adolescents had not accessed to their right on informing of their decision making; information and education; health; confidentiality and privacy; and treating with equity and no discrimination. Also, the conditional factors influenced to the accessibility on such rights were lacking of knowledge on reproductive health and negative attitude toward this matter among the people concerned. There were still no regulations or policies on the performance of authority agencies and the factors on social dimensions, traditions, customs, sexual culture and religion.

Originality/value

The findings from this study would be a help to promote the accessibility for adolescents to reproductive health rights under the Prevention and Solution of Adolescent Pregnancy Problem Act, B.E. 2559 (2016) specific on standard criteria reproductive health services from hospitals and the involvement from Ministry of Education for the development of sex life skill and reproductive health for the teacher.

Details

Journal of Health Research, vol. 33 no. 1
Type: Research Article
ISSN: 2586-940X

Keywords

Open Access
Book part
Publication date: 9 December 2021

Mark Taylor and Richard Kirkham

A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such…

Abstract

A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such interference should be clearly detailed in law, overseen by a transparent process and not left to the vagaries of administrative discretion. If a state surveils those it governs and claims the interference to be in the public interest, then the evidence base on which that claim stands and the operative conception of public interest should be subject to critical examination. Unfortunately, there is an inconsistency in the regulatory burden associated with access to confidential patient information for non-health-related surveillance purposes and access for health-related surveillance or research purposes. This inconsistency represents a systemic weakness to inform or challenge an evidence-based policy of non-health-related surveillance. This inconsistency is unjustified and undermines the qualities recognised to be necessary to maintain a trustworthy confidential public health service. Taking the withdrawn Memorandum of Understanding (MoU) between NHS Digital and the Home Office as a worked example, this chapter demonstrates how the capacity of the law to constrain the arbitrary or unwarranted exercise of power through judicial review is not sufficient to level the playing field. The authors recommend ‘levelling up’ in procedural oversight, and adopting independent mechanisms equivalent to those adopted for establishing the operative conceptions of public interest in the context of health research to non-health-related surveillance purposes.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Article
Publication date: 11 August 2023

Michael Nii Laryeafio and Omoruyi Courage Ogbewe

Qualitative research that involves the use of human participants calls for the need to protect those participants to give their honest view during data collection. This is an…

12406

Abstract

Purpose

Qualitative research that involves the use of human participants calls for the need to protect those participants to give their honest view during data collection. This is an important part of every primary data collection in qualitative studies using interviews. This paper aims to investigate all available ethical considerations that need to be observed by the researcher when conducting primary data collection through interview and to explore the theories that underpin the ethics in qualitative studies.

Design/methodology/approach

This paper systemically reviewed existing qualitative data on ethics and gathered information that were analysed and presented on the topic area.

Findings

The findings show that ethical considerations deal with the various approaches adopted by the researcher to make the participants feel safe to participate in any given researcher. During an interview process in qualitative research, the findings show that anonymity, voluntary participation, privacy, confidentiality, option to opt out and avoiding misuse of findings are ethical considerations that must be observed by the researcher. The outcome of the investigation also shows that deontology and utilitarianism, rights and virtue are the main theories that underpin ethical considerations in research.

Originality/value

The rights of the research participants need to be respected in qualitative research to assist in gathering accurate information to achieve the objectives of study. This and other ethical principles such as anonymity, privacy, confidentiality, voluntary participation and option to opt out guide the researcher to systematically adhere to data collection approaches that yield valid results in qualitative data collection using interviews.

Details

Journal of Ethics in Entrepreneurship and Technology, vol. 3 no. 2
Type: Research Article
ISSN: 2633-7436

Keywords

1 – 10 of over 1000