Search results

1 – 10 of 231

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-83549-098-3

Article
Publication date: 6 September 2023

Zeynab Malakouti Khah and Aref Khalili Paji

The purpose of this study is to examine Iran’s anti-money laundering (AML) system from a legal and criminal perspective and to understand the obstacles for international…

Abstract

Purpose

The purpose of this study is to examine Iran’s anti-money laundering (AML) system from a legal and criminal perspective and to understand the obstacles for international cooperation and the extent to which it aligns with financial action task force (FATF) standards. In this regard, three aspects are examined, namely, enforcement and guarantees of preventive measures, penalty for ML offences and the burden of proof.

Design/methodology/approach

This subject is examined through the legal–criminal perspective, which concentrates on the effectiveness of legal measures in tackling criminal issues by focusing on criminal law. The legal–criminal viewpoint considers criminal behaviour as a breach of societal norms and strives to combat it through legal channels.

Findings

Iran’s AML laws and regulations are partially compliant with the financial action task force (FATF) recommendations. However, the main obstacle is not the lack of sufficient laws, rather the lack of proper implementation of these laws. In addition, there are foundational shortages, such as the absence of a national risk document to guide an action based on current risks.

Originality/value

No comprehensive study has analysed Iran’s AML laws, referring to the three main aspects of enforcement and guarantees of preventive measures, penalties for ML offenses and the burden of proof. In general, there are few research papers on Iran’s AML laws owing to Iran’s high ranking in ML/TF. However, analysing Iran’s regulations can be helpful in taking a step towards effective international AML practices.

Details

Journal of Money Laundering Control, vol. 27 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

8129

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Article
Publication date: 29 January 2024

Miguel Angel Martínez Martínez

The purpose of the article is to show the regime of truth in the institutional commissions that have the objective of restoring history by establishing a democratic, equitable…

Abstract

Purpose

The purpose of the article is to show the regime of truth in the institutional commissions that have the objective of restoring history by establishing a democratic, equitable, comprehensive, inclusive and fair criterion against the attempts of re-victimization and suppression of memory that Western political and cultural traditions have installed through their mechanisms of power.

Design/methodology/approach

Based on the analysis of the cases of Inés Fernández Ortega and Valentina Rosendo Cantú, they establish the material conditions from which prejudices and hegemonic stereotypes are intertwined to reproduce serious violations of human rights in democratic political and epistemic frameworks. The colonial function of the truth commissions in Mexico is analyzed, which are presented as mechanisms for social development, political and colonial reproduction of liberal democracy.

Findings

The qualitative results allow considering the way in which the different truth commissions in Mexico have been strongly linked to epistemic mechanisms in which truth and justice favor the reproduction of established relationships based on race, social class and gender. Especially in the so-called democratic transition, violence, truth and justice come together to highlight power relations in situations that have been disavowed by the intelligentsia.

Research limitations/implications

The limitations of the research are found in the historical configuration of the truth commissions in Mexico. The data, references and assessments are crossed by the initial function of the truth commissions and the establishment of apparatuses and mechanisms based on transitional justice. Based on this, it can be considered a methodological oversight to shift the analysis of truth commissions toward a critical assessment of the truth as a regime of government and hegemonic and colonization criteria from two very specific cases.

Originality/value

The originality of the work is found in the critical discernment of truth as a political category and the coloniality of power.

Details

Equality, Diversity and Inclusion: An International Journal, vol. 43 no. 6
Type: Research Article
ISSN: 2040-7149

Keywords

Article
Publication date: 23 June 2023

Abdirahman Hassan Hersi

Concerns on money laundering (ML) and terrorist financing increased, as ML accounted 2%–5% of the global GDP, with Switzerland, the USA, Canada, India and Russia having high…

Abstract

Purpose

Concerns on money laundering (ML) and terrorist financing increased, as ML accounted 2%–5% of the global GDP, with Switzerland, the USA, Canada, India and Russia having high laundering rates. Banks were fined over US$320bn in 2008, but money laundering still accounted for 3.6% of global GDP in 2009, thereby indicating the need for effective regimes. Therefore, this study aims to critically analyze the antimoney laundering (AML)/CFT regime of Somalia, identify loopholes in the regime, raise awareness and propose recommendations for regime improvement.

Design/methodology/approach

The qualitative research approach is used to compare Somalia’s AML/CFT regime with the corresponding regime of Malaysia through the black letter method combined with document analysis. Malaysia is selected as a benchmark for two reasons: firstly, it is an Islamic country like Somalia, and secondly, Malaysia has complied with integrity-related standards.

Findings

This study revealed that an impactful AML/CTF regime is reached by closing loopholes in the law, reevaluating and improving regulatory agencies and measures, facilitating formal financial services and collaborating with regional and international standard setters. According to the results, Somalia AML/CFT regime is counterproductive in criminalizing offenses; regulating digital currencies and mobile money, disclosures and nonfinancial business and provisions; and governing training requirements for regulatory agencies and financial institutions.

Originality/value

To the best of the author’s knowledge, this paper is the first of its kind in the study of Somalia’s regime building. Also, this study incorporates rich scholarly discourse on effective regime building.

Details

Journal of Money Laundering Control, vol. 27 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 28 March 2024

Juan A. Nel and Zindi Venter

This paper aims to provide an overview of South African perspectives on preventing, monitoring and combating hate victimisation, towards informing international understandings.

Abstract

Purpose

This paper aims to provide an overview of South African perspectives on preventing, monitoring and combating hate victimisation, towards informing international understandings.

Design/methodology/approach

Using a general review approach, this paper provides a historical examination of measures proposed by the South African Government and civil society since 1994, to prevent, monitor and combat hate crime, hate speech and intentional unfair discrimination.

Findings

Regardless of a constitutional commitment to social inclusion, diversity and minority rights, significant progress remains lacking after almost three decades of related advocacy, lobbying and limited government intervention. Findings of the South African Hate Crimes Working Group (HCWG) longitudinal Monitoring Project emphasise the need for decisive legal responses to hate victimisation.

Social implications

A Bill, recognising hate crime and hate speech as distinct criminal offences, has been in development for almost 15 years and will soon serve before Parliament. Enactment of this legislation will be ground-breaking in Africa.

Originality/value

This paper contributes to the field of hate studies by providing an overview of the journey towards current conceptual understandings of hate in (South) Africa. It sets the stage for evaluating the potential of the redesigned HCWG monitoring tool, which holds promise for early identification and intervention in hate hotspots and targeted sectors. This instrument can establish trends not only in South Africa but also across the African continent.

Content available
Article
Publication date: 29 February 2024

Samiksha Mathur and Sonu Agarwal

This paper aims to discuss the positioning of international organisations (IOs) in the realm of international law. It proposes a more robust approach, arguing IOs have legal…

Abstract

Purpose

This paper aims to discuss the positioning of international organisations (IOs) in the realm of international law. It proposes a more robust approach, arguing IOs have legal obligations akin to states to the extent which could be fulfilled by them. This paper suggests making IOs parties to international treaties like the International Covenant on Civil and Political Rights (ICCPR), International Covenant on Economic Social and Cultural Rights (ICESCR) and Geneva Convention 1949 to codify their international responsibilities. In addition, it proposes amending multilateral treaties to grant IOs membership and create binding legal obligations for them, thereby enhancing the overall legal framework for IOs.

Design/methodology/approach

The paper opted for qualitative analytical approach of research by referring to international treaties and scholarly papers.

Findings

The authors have evaluated the bindingness of international law on IOs. The authors argue that jus cogens and customary international law are equally binding on IOs. However, treaties could only be binding on IOs to the extent of their consent. The authors have assessed prior violations of IOs. The authors argue that, to prevent such violations by IOs, creating obligations is the first step. Second, amendments are required in the existing international treaties that reflect the foundations of international humanitarian and international human rights law like the Geneva Convention 1949, ICCPR, and ICESCR, to permit IOs to join these treaties, resulting in binding international legal obligations.

Research limitations/implications

The most prominent assertion of this paper is that IOs as subjects of international law are bound by the principles of international law, including treaty law with consent, customary international laws, general principles of law and peremptory norms. To fulfil these obligations, a regime needs to be introduced wherein amendment is made in treaties to make IOs parties to them and structuring the law on responsibility for IOs. Considering the multifaceted nature of IO, the role it performs in contemporary times requires them to be bound by rules of international law just like states. There is a need to settle their position in global governance and give them more teeth to understand and fulfil their duties to ensure smooth functioning in the long run.

Originality/value

The paper fulfils an identified gap in the positioning of IOs under the international law.

Details

International Journal of Law and Management, vol. 66 no. 5
Type: Research Article
ISSN: 1754-243X

Keywords

Book part
Publication date: 27 September 2024

Christopher W. Mullins

This chapter discusses the creation, structure, and functioning of the International Criminal Court. It also examines its operations to date and addresses many contemporary…

Abstract

This chapter discusses the creation, structure, and functioning of the International Criminal Court. It also examines its operations to date and addresses many contemporary criticisms of the court.

Details

A Socio-Legal History of the Laws of War
Type: Book
ISBN: 978-1-83753-384-8

Keywords

Article
Publication date: 12 August 2024

Ambareen Beebeejaun and Raahil Mandarun

The identification principle serves as a key tool in holding companies criminally accountable for acts of its agents, with the aim to secure convictions and promote a shift in…

Abstract

Purpose

The identification principle serves as a key tool in holding companies criminally accountable for acts of its agents, with the aim to secure convictions and promote a shift in corporate behaviour. Unfortunately, in Mauritius, the law is still not clear on how to engage the corporate criminal liability of the company although courts have attempted to apply the identification doctrine in some instances. Consequently, several corporate bodies are left unpunished for their criminal acts. Hence, the purpose of this paper is to evaluate the identification principle's applicability to corporate crimes in Mauritius.

Design/methodology/approach

To achieve the research objective, the black letter research method was adopted to collect secondary data by analysing the related laws on corporate criminal liability and a comparative analysis with some other countries’ rules on the subject matter was conducted. A desk-based approach and content analysis was used to collect this information. The countries selected for the comparison are the USA, UK and Canada.

Findings

From the critical analysis conducted in this paper, it is imperative for Mauritius to establish a more robust corporate criminal liability framework. The identified deficiencies, notably in Section 44(1)(a) of the Interpretation and General Clauses Act, should be reviewed and replaced with comprehensive norms with the goal of ensuring that corporate crimes are tackled properly. Such a proactive strategy not only empowers authorities to effectively address corporate crimes but also encourages corporate entities to take a proactive approach through the implementation of comprehensive compliance frameworks that are reviewed and updated on a regular basis.

Originality/value

At present, this study is among the few academic writings on corporate criminal liability in the context of Mauritius and it is being carried out with the aim of combining a large amount of empirical, theoretical and factual information that can be of use to various stakeholders and not only to academics.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 29 July 2024

Kenji Logie and Marie-Helen Maras

The objective of this paper is to explore the development of the Blackmail-as-a-Service business model within the Digital Thrift Shop. This service model involves the sale of…

Abstract

Purpose

The objective of this paper is to explore the development of the Blackmail-as-a-Service business model within the Digital Thrift Shop. This service model involves the sale of doxing files to customers, as well as the removal of the content from the shop and its dissemination to victims or individuals closely connected to them.

Design/methodology/approach

To access the Digital Thrift shop, this study relies on the Tor browser and a darknet indexing site. The authors then use an application to collect and store the web pages as PDFs. Finally, content analysis is performed on these PDFs to understand the Blackmail-as-a-Service business model developed by the Digital Thrift.

Findings

The doxing data available on the Digital Thrift is primarily targeted toward women. Digital Thrift has also established a way to value the purchase, sale and the removal of blackmail data. The presence of Blackmail-as-a-Service on darknet sites poses unique challenges for criminal justice agencies in terms of jurisdiction, due to the lack of harmonized laws and the obstacles involved in taking down content from darknet sites. Finally, the use of a service model for blackmail allows criminals without technical skills to engage in cyber-victimization using blackmail.

Originality/value

Research into Blackmail-as-a-Service from boutique providers has not been conducted. To the best of the authors’ knowledge, this is one of the first study seeking to understand the Blackmail-as-a-Service business model on the darknet when used to target adults. This study presents evidence of a lack of connection between the buyers of the compromising material and the potential victim, challenging preconceived notions about image-based sexual abuse and its connection to individuals involved in interpersonal relationships.

Details

Journal of Aggression, Conflict and Peace Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-6599

Keywords

1 – 10 of 231