Search results

1 – 10 of 14
Expert briefing
Publication date: 15 December 2023

Duterte has come under criticism in Congress over her use of confidential funds (CFs). Despite the president’s remarks, he and his deputy appear to be at odds on a range of issues.

Article
Publication date: 24 October 2023

Doron Goldbarsht

The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks…

Abstract

Purpose

The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks that protect consumers, combat money laundering and address risks linked to digital assets. Conventional approaches to confiscation and anti-money laundering are deemed insufficient in this evolving landscape. The absence of a central authority and the use of encryption hinder the identification of asset owners and the tracking of illicit activities. Moreover, the international and cross-border nature of digital assets complicates matters, demanding global coordination. The purpose of this study is to highlight that the effective combat of money laundering, legislative action, innovative investigative techniques and public–private partnerships are crucial.

Design/methodology/approach

The focal point of this paper is Australia’s approach to law enforcement in the realm of digital assets. It underscores the pivotal role of robust confiscation mechanisms in disrupting criminal networks operating through digital means. The paper firmly asserts that staying ahead of the curve and maintaining an agile stance is paramount. Criminals are quick to embrace emerging technologies, necessitating proactive measures from policymakers and law enforcement agencies.

Findings

It is argued that an agile and comprehensive approach is vital in countering money laundering, as criminals adapt to new technologies. Policymakers and law enforcement agencies must remain proactively ahead of these developments to efficiently identify, trace and seize digital assets involved in illicit activities, thereby safeguarding the integrity of the global financial system.

Originality/value

This paper provides a distinctive perspective by examining Australia’s legal anti-money laundering and counterterrorism financing framework, along with its law enforcement strategies within the realm of the digital asset landscape. While there is a plethora of literature on both asset confiscation and digital assets, there is a noticeable absence of exploration into their interplay, especially within the Australian context.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Expert briefing
Publication date: 11 April 2024

The authorities do not appear especially concerned about the threat posed by the group, but there is sure to be an overall tightening of security during the general election…

Book part
Publication date: 19 April 2024

Júlia Palik

What kinds of support do interstate rivals provide to domestic actors in ongoing civil wars? And how do domestic actors utilize the support they receive? This chapter answers…

Abstract

What kinds of support do interstate rivals provide to domestic actors in ongoing civil wars? And how do domestic actors utilize the support they receive? This chapter answers these questions by comparing Iranian and Saudi military and non-military (mediation, foreign aid and religious soft-power promotion) support to the Houthis and to the Government of Yemen (GoY) during the Saada wars (2004–2010) and the internationalized civil war (2015–2018). It also focuses on the processes through which the GoY and the Houthis have utilized this support for their own strategic purposes. This chapter applies a structured, focused comparison methodology and relies on data from a review of both primary and secondary sources complemented by 14 interviews. This chapter finds that there were less external interventions in the conflict in Saada than in the internationalized civil war. During the latter, a broader set of intervention strategies enabled further instrumentalization by domestic actors, which in turn contributed to the protracted nature of the conflict. This chapter contributes to the literature on interstate rivalry and third-party intervention. The framework of analysis is applicable to civil wars that experience intervention by rivals, such as Syria or Libya.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

Article
Publication date: 1 November 2023

Yifan Pan, Lei Zhang, Dong Mei, Gangqiang Tang, Yujun Ji, Kangning Tan and Yanjie Wang

This study aims to present a type of metamorphic mechanism-based quadruped crawling robot. The trunk design of the robot has a metamorphic mechanism, which endows it with…

Abstract

Purpose

This study aims to present a type of metamorphic mechanism-based quadruped crawling robot. The trunk design of the robot has a metamorphic mechanism, which endows it with excellent crawling capability and adaptability in challenging environments.

Design/methodology/approach

The robot consists of a metamorphic trunk and four series-connected three-joint legs. First, the walking and steering strategy is planned through the stability and mechanics analysis. Then, the walking and steering performance is examined using virtual prototype technology, as well as the efficacy of the walking and turning strategy.

Findings

The metamorphic quadruped crawling robot has wider application due to its variable trunk configuration and excellent leg motion space. The robot can move in two modes (constant trunk and trunk configuration transformation, respectively, while walking and rotating), which exhibits outstanding stability and adaptability in the examination and verification of prototypes.

Originality/value

The design can enhance the capacity of the quadruped crawling robot to move across a complex environment. The virtual prototype technology verifies that the proposed walking and steering strategy has good maneuverability and stability, which considerably expands the application opportunity in the fields of complicated scene identification and investigation.

Details

Industrial Robot: the international journal of robotics research and application, vol. 51 no. 1
Type: Research Article
ISSN: 0143-991X

Keywords

Expert briefing
Publication date: 14 December 2023

Notable poll-bound countries include the United States, India, Russia, Ukraine, Indonesia, Egypt and South Africa, and possibly the United Kingdom. Textual and audio-visual…

Details

DOI: 10.1108/OXAN-DB284024

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 29 November 2023

Hussain Syed Gowhor

This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up…

Abstract

Purpose

This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up with the criteria, which will make this tool an effective one in early detection of terrorist financing activities.

Design/methodology/approach

Considering the research aim, this research uses the funnelling method for identifying effectiveness criteria. Funnelling is a method of literature review that helps find pertinent literature by refining the search through filtering the available research (Ridley, 2008). Using this method, the researcher first applied the criteria of actionable intelligence to filter the financial intelligence tools to select the most promising and important tool (suspicious transaction reporting) for early detection of terrorist financing activities. The funnelling method was also applied to derive the effectiveness criteria from the operational features, and corresponding limitations, of the suspicious transaction reporting system. The funnelling method was also used to identify those operational features and limitations of suspicious transaction reporting that have the most direct relevance to the early detection problem of suspicious transaction reporting.

Findings

There are some operational features of STR that give rise to certain limitations that undermine its effectiveness in terms of early detection of terrorist financing activities. The limitations of STR necessitate a search for criteria that will make STR effective in early detection of terrorist financing activities. Based on the operational features and their corresponding limitations, effectiveness criteria for STR have been derived in this study. It is shown how these effectiveness criteria can remove the limitations of STR.

Research limitations/implications

The list of operational features and the corresponding limitations based on which the effectiveness criteria have been derived may not be exhaustive. There may have other operational features, and corresponding limitations that also make STR largely ineffective in the early detection of terrorist financing activities, and for which more effectiveness criteria should also be derived.

Practical implications

The limitations and the effectiveness criteria will pave the way for redesigning STR in such a way that will make it highly useful for detecting financing activities relating to imminent terrorist attacks.

Social implications

The society will experience fewer terrorist attacks that will make the society peaceful, happy and vibrant.

Originality/value

In this study, the effectiveness criteria of STR for early detection of terrorist financing activities have been derived in an innovative way by deducing them from the operational features of STR and the corresponding limitations.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 28 June 2023

Mehmet Çetin, Ümit Şevik and Özgür Kökalan

Based on the role congruity theory (RCT), this study aims to determine the effects of gender roles on life satisfaction and occupational commitment levels of female employees…

Abstract

Purpose

Based on the role congruity theory (RCT), this study aims to determine the effects of gender roles on life satisfaction and occupational commitment levels of female employees working in law enforcement.

Design/methodology/approach

Hypotheses were tested through a series of hierarchical regression analyses on the data collected from 394 female respondents who are having their first year in law enforcement.

Findings

Both male and female gender roles were positively related to the life satisfaction levels of women working in law enforcement. Female gender role was also positively linked to higher levels of occupational commitment. The link between male gender role and occupational commitment was nonlinear; therefore, the positive relationship between the variables turns into a negative one for higher levels of male gender role.

Originality/value

This study furthers the understanding of RCT and its implications regarding how gender roles link to work-related outcomes, especially for women working in a male-dominated work context.

Details

Management Research Review, vol. 46 no. 12
Type: Research Article
ISSN: 2040-8269

Keywords

Article
Publication date: 11 December 2023

Sarah Knight, Abbie Maroño and David Keatley

The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to…

Abstract

Purpose

The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to other factors underlying extremist behaviours. While the end goal of many extremists may be functionally similar, the pathways into extremism vary, and the literature has demonstrated that a “one-size-fits-all” explanation does not exist. Motivational drivers are complex and dynamic; therefore, attempting to identify a terrorist “profile” has limited applied efficacy.

Design/methodology/approach

This study applied a temporal approach (“crime script analysis” or CSA) to identify, map and compare the sequential stages (or “scenes”) in the life histories of violent and non-violent extremists who have committed acts of extremism across different age groups. Crime scripts comprising mainly qualitative data for 40 male extremists (20 violent, 20 non-violent “cases”) were developed, and CSA was conducted according to the age at which they committed their first extremist offence.

Findings

Results demonstrated key temporal, developmental differences between the pathways of extremists who commit their first offence at different ages. One key difference was that for both the violent and non-violent extremists, those under 30 used the internet as a main means of joining networks and spreading information, whereas the over 30s made more personal, community links.

Originality/value

This research can aid identification of potential environmental triggers and potential increased susceptibility to triggers across certain age groups.

Details

Journal of Criminal Psychology, vol. 14 no. 2
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 21 November 2023

Afzal Izzaz Zahari, Jamaliah Said, Kamarulnizam Abdullah and Norazam Mohd Noor

This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in…

Abstract

Purpose

This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in Malaysia.

Design/methodology/approach

The study used an open-ended question and focus group methods to gather information from 20 Malaysian enforcement officers with extensive experience in dealing with terrorism-related activities, as they strive to prevent and counter terrorism incidents. In addition, experienced practitioners and field experts also contributed to the study.

Findings

The study reveals various innovative financial methods used by terrorist-linked organisations to evade detection by local enforcement agencies. These findings are consistent with previous research, which highlights the intelligence of these organisations in avoiding detection by financial regulators.

Research limitations/implications

The findings are based on the perspectives of enforcement officers involved in preventing and countering terrorism activities. Further research could be conducted to gather insights from other government agencies, such as the judiciary or local agencies.

Practical implications

The study offers practical suggestions for organisations and institutions on effectively monitoring and taking appropriate actions in financial activities related to terrorism.

Originality/value

This study provides unique insights into the financial methods of terrorism-related organisations in an emerging country in Southeast Asia. Its findings can be applied throughout the region, given the country’s global connectivity. Furthermore, the study is distinctive in that it provides information from enforcement officers within terrorism-related government organisations, an area where resources are limited. The study also considers the impact of the pandemic on the development of these financial innovations by terrorist organisations.

Details

Journal of Criminological Research, Policy and Practice, vol. 10 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

1 – 10 of 14