Search results
1 – 10 of 14
Duterte has come under criticism in Congress over her use of confidential funds (CFs). Despite the president’s remarks, he and his deputy appear to be at odds on a range of issues.
Details
DOI: 10.1108/OXAN-DB284044
ISSN: 2633-304X
Keywords
Geographic
Topical
The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks…
Abstract
Purpose
The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks that protect consumers, combat money laundering and address risks linked to digital assets. Conventional approaches to confiscation and anti-money laundering are deemed insufficient in this evolving landscape. The absence of a central authority and the use of encryption hinder the identification of asset owners and the tracking of illicit activities. Moreover, the international and cross-border nature of digital assets complicates matters, demanding global coordination. The purpose of this study is to highlight that the effective combat of money laundering, legislative action, innovative investigative techniques and public–private partnerships are crucial.
Design/methodology/approach
The focal point of this paper is Australia’s approach to law enforcement in the realm of digital assets. It underscores the pivotal role of robust confiscation mechanisms in disrupting criminal networks operating through digital means. The paper firmly asserts that staying ahead of the curve and maintaining an agile stance is paramount. Criminals are quick to embrace emerging technologies, necessitating proactive measures from policymakers and law enforcement agencies.
Findings
It is argued that an agile and comprehensive approach is vital in countering money laundering, as criminals adapt to new technologies. Policymakers and law enforcement agencies must remain proactively ahead of these developments to efficiently identify, trace and seize digital assets involved in illicit activities, thereby safeguarding the integrity of the global financial system.
Originality/value
This paper provides a distinctive perspective by examining Australia’s legal anti-money laundering and counterterrorism financing framework, along with its law enforcement strategies within the realm of the digital asset landscape. While there is a plethora of literature on both asset confiscation and digital assets, there is a noticeable absence of exploration into their interplay, especially within the Australian context.
Details
Keywords
The authorities do not appear especially concerned about the threat posed by the group, but there is sure to be an overall tightening of security during the general election…
Details
DOI: 10.1108/OXAN-DB286369
ISSN: 2633-304X
Keywords
Geographic
Topical
What kinds of support do interstate rivals provide to domestic actors in ongoing civil wars? And how do domestic actors utilize the support they receive? This chapter answers…
Abstract
What kinds of support do interstate rivals provide to domestic actors in ongoing civil wars? And how do domestic actors utilize the support they receive? This chapter answers these questions by comparing Iranian and Saudi military and non-military (mediation, foreign aid and religious soft-power promotion) support to the Houthis and to the Government of Yemen (GoY) during the Saada wars (2004–2010) and the internationalized civil war (2015–2018). It also focuses on the processes through which the GoY and the Houthis have utilized this support for their own strategic purposes. This chapter applies a structured, focused comparison methodology and relies on data from a review of both primary and secondary sources complemented by 14 interviews. This chapter finds that there were less external interventions in the conflict in Saada than in the internationalized civil war. During the latter, a broader set of intervention strategies enabled further instrumentalization by domestic actors, which in turn contributed to the protracted nature of the conflict. This chapter contributes to the literature on interstate rivalry and third-party intervention. The framework of analysis is applicable to civil wars that experience intervention by rivals, such as Syria or Libya.
Details
Keywords
Yifan Pan, Lei Zhang, Dong Mei, Gangqiang Tang, Yujun Ji, Kangning Tan and Yanjie Wang
This study aims to present a type of metamorphic mechanism-based quadruped crawling robot. The trunk design of the robot has a metamorphic mechanism, which endows it with…
Abstract
Purpose
This study aims to present a type of metamorphic mechanism-based quadruped crawling robot. The trunk design of the robot has a metamorphic mechanism, which endows it with excellent crawling capability and adaptability in challenging environments.
Design/methodology/approach
The robot consists of a metamorphic trunk and four series-connected three-joint legs. First, the walking and steering strategy is planned through the stability and mechanics analysis. Then, the walking and steering performance is examined using virtual prototype technology, as well as the efficacy of the walking and turning strategy.
Findings
The metamorphic quadruped crawling robot has wider application due to its variable trunk configuration and excellent leg motion space. The robot can move in two modes (constant trunk and trunk configuration transformation, respectively, while walking and rotating), which exhibits outstanding stability and adaptability in the examination and verification of prototypes.
Originality/value
The design can enhance the capacity of the quadruped crawling robot to move across a complex environment. The virtual prototype technology verifies that the proposed walking and steering strategy has good maneuverability and stability, which considerably expands the application opportunity in the fields of complicated scene identification and investigation.
Details
Keywords
Notable poll-bound countries include the United States, India, Russia, Ukraine, Indonesia, Egypt and South Africa, and possibly the United Kingdom. Textual and audio-visual…
Details
DOI: 10.1108/OXAN-DB284024
ISSN: 2633-304X
Keywords
Geographic
Topical
This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up…
Abstract
Purpose
This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up with the criteria, which will make this tool an effective one in early detection of terrorist financing activities.
Design/methodology/approach
Considering the research aim, this research uses the funnelling method for identifying effectiveness criteria. Funnelling is a method of literature review that helps find pertinent literature by refining the search through filtering the available research (Ridley, 2008). Using this method, the researcher first applied the criteria of actionable intelligence to filter the financial intelligence tools to select the most promising and important tool (suspicious transaction reporting) for early detection of terrorist financing activities. The funnelling method was also applied to derive the effectiveness criteria from the operational features, and corresponding limitations, of the suspicious transaction reporting system. The funnelling method was also used to identify those operational features and limitations of suspicious transaction reporting that have the most direct relevance to the early detection problem of suspicious transaction reporting.
Findings
There are some operational features of STR that give rise to certain limitations that undermine its effectiveness in terms of early detection of terrorist financing activities. The limitations of STR necessitate a search for criteria that will make STR effective in early detection of terrorist financing activities. Based on the operational features and their corresponding limitations, effectiveness criteria for STR have been derived in this study. It is shown how these effectiveness criteria can remove the limitations of STR.
Research limitations/implications
The list of operational features and the corresponding limitations based on which the effectiveness criteria have been derived may not be exhaustive. There may have other operational features, and corresponding limitations that also make STR largely ineffective in the early detection of terrorist financing activities, and for which more effectiveness criteria should also be derived.
Practical implications
The limitations and the effectiveness criteria will pave the way for redesigning STR in such a way that will make it highly useful for detecting financing activities relating to imminent terrorist attacks.
Social implications
The society will experience fewer terrorist attacks that will make the society peaceful, happy and vibrant.
Originality/value
In this study, the effectiveness criteria of STR for early detection of terrorist financing activities have been derived in an innovative way by deducing them from the operational features of STR and the corresponding limitations.
Details
Keywords
Mehmet Çetin, Ümit Şevik and Özgür Kökalan
Based on the role congruity theory (RCT), this study aims to determine the effects of gender roles on life satisfaction and occupational commitment levels of female employees…
Abstract
Purpose
Based on the role congruity theory (RCT), this study aims to determine the effects of gender roles on life satisfaction and occupational commitment levels of female employees working in law enforcement.
Design/methodology/approach
Hypotheses were tested through a series of hierarchical regression analyses on the data collected from 394 female respondents who are having their first year in law enforcement.
Findings
Both male and female gender roles were positively related to the life satisfaction levels of women working in law enforcement. Female gender role was also positively linked to higher levels of occupational commitment. The link between male gender role and occupational commitment was nonlinear; therefore, the positive relationship between the variables turns into a negative one for higher levels of male gender role.
Originality/value
This study furthers the understanding of RCT and its implications regarding how gender roles link to work-related outcomes, especially for women working in a male-dominated work context.
Details
Keywords
Sarah Knight, Abbie Maroño and David Keatley
The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to…
Abstract
Purpose
The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to other factors underlying extremist behaviours. While the end goal of many extremists may be functionally similar, the pathways into extremism vary, and the literature has demonstrated that a “one-size-fits-all” explanation does not exist. Motivational drivers are complex and dynamic; therefore, attempting to identify a terrorist “profile” has limited applied efficacy.
Design/methodology/approach
This study applied a temporal approach (“crime script analysis” or CSA) to identify, map and compare the sequential stages (or “scenes”) in the life histories of violent and non-violent extremists who have committed acts of extremism across different age groups. Crime scripts comprising mainly qualitative data for 40 male extremists (20 violent, 20 non-violent “cases”) were developed, and CSA was conducted according to the age at which they committed their first extremist offence.
Findings
Results demonstrated key temporal, developmental differences between the pathways of extremists who commit their first offence at different ages. One key difference was that for both the violent and non-violent extremists, those under 30 used the internet as a main means of joining networks and spreading information, whereas the over 30s made more personal, community links.
Originality/value
This research can aid identification of potential environmental triggers and potential increased susceptibility to triggers across certain age groups.
Details
Keywords
Afzal Izzaz Zahari, Jamaliah Said, Kamarulnizam Abdullah and Norazam Mohd Noor
This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in…
Abstract
Purpose
This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in Malaysia.
Design/methodology/approach
The study used an open-ended question and focus group methods to gather information from 20 Malaysian enforcement officers with extensive experience in dealing with terrorism-related activities, as they strive to prevent and counter terrorism incidents. In addition, experienced practitioners and field experts also contributed to the study.
Findings
The study reveals various innovative financial methods used by terrorist-linked organisations to evade detection by local enforcement agencies. These findings are consistent with previous research, which highlights the intelligence of these organisations in avoiding detection by financial regulators.
Research limitations/implications
The findings are based on the perspectives of enforcement officers involved in preventing and countering terrorism activities. Further research could be conducted to gather insights from other government agencies, such as the judiciary or local agencies.
Practical implications
The study offers practical suggestions for organisations and institutions on effectively monitoring and taking appropriate actions in financial activities related to terrorism.
Originality/value
This study provides unique insights into the financial methods of terrorism-related organisations in an emerging country in Southeast Asia. Its findings can be applied throughout the region, given the country’s global connectivity. Furthermore, the study is distinctive in that it provides information from enforcement officers within terrorism-related government organisations, an area where resources are limited. The study also considers the impact of the pandemic on the development of these financial innovations by terrorist organisations.
Details