Search results

1 – 4 of 4
Open Access
Article
Publication date: 5 February 2024

Ariadna H. Ochnio

Recent developments in the EU’s anti-corruption strategy have brought the EU closer to meeting the UNCAC’s objectives, i.e. the Proposal for a Directive on combating corruption…

Abstract

Purpose

Recent developments in the EU’s anti-corruption strategy have brought the EU closer to meeting the UNCAC’s objectives, i.e. the Proposal for a Directive on combating corruption (2023) and the Proposal for a Directive on Asset Recovery and Confiscation (2022). This paper aims to discuss these developments from the perspective of the UNCAC, to identify missing elements in the EU’s asset recovery mechanisms.

Design/methodology/approach

Critical approach towards EU anti-corruption policy (discussing the problems and solutions). Review of EU developments in asset recovery law.

Findings

There is a political will on the part of the EU to fight corruption through the rules enshrined in the UNCAC. However, improving EU law by introducing a new type of confiscation of unexplained wealth and criminalising illicit enrichment, without establishing convergent rules for the return of corrupt assets from EU territory to the countries of origin, cannot be seen as sufficient action to achieve the UNCAC’s objectives. In modelling mechanisms of the return of assets, the EU should search for solutions to overcome the difficulties resulting from the ordre public clause remaining a significant factor conditioning mutual legal assistance.

Originality/value

This paper discusses the possible input of the EU, as a non-State Party to the UNCAC, to advance implementing the UNCAC solutions on asset recovery by establishing convergent rules for the return of corrupt assets from EU territory to countries of origin.

Details

Journal of Money Laundering Control, vol. 27 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 29 May 2023

Emna Mnif, Nahed Zghidi and Anis Jarboui

The potential growth in cryptocurrencies has raised serious ethical and religious issues leading to a new investment rethinking. This paper aims to identify the influence of…

1461

Abstract

Purpose

The potential growth in cryptocurrencies has raised serious ethical and religious issues leading to a new investment rethinking. This paper aims to identify the influence of religiosity on cryptocurrency acceptance through an extended technology acceptance model (TAM) model.

Design/methodology/approach

In the first phase, this research develops a conceptual model that extends the theory of the TAM by integrating the religiosity component. In the second phase, the proposed model is tested using search volume queries in daily frequencies from 01/01/2018 to 31/12/2022 and structural equation modeling (SEM).

Findings

The empirical results demonstrate a significant positive effect of religiosity on the intention to use cryptocurrency, the users' perceived usefulness (PU) and ease of use (PEOU). Besides, the authors note that PEOU positively influences the intention. Furthermore, religiosity indirectly affects the intention through the PEOU and positively impacts the intention through the PU. In the same way, PEOU has a considerable indirect effect on the intention through PU.

Practical implications

This study has practical and theoretical contributions by providing insights into the cryptocurrency acceptance factors. In other words, it contributes to the literature by extending TAM models. Practically, it helps managers determine factors affecting the intention to use cryptocurrencies. Therefore, they can adjust their industry according to the suitable characteristics for creating successful projects.

Social implications

Identifying the effect of religiosity on cryptocurrency users' choices and decisions has a social added value as it provides an understanding of the evolution of psychological variants.

Originality/value

The findings emphasize the importance of integrating big data to analyze users' attitudes. Besides, most studies on cryptocurrency acceptance are investigated based on one kind of religion, such as Christianity or Islam. Nevertheless, this paper integrates the effect of five types of faith on the users' intentions.

Details

Arab Gulf Journal of Scientific Research, vol. 42 no. 2
Type: Research Article
ISSN: 1985-9899

Keywords

Open Access
Article
Publication date: 26 February 2024

Chiara Valentini and Krishnamurthy Sriramesh

Personal influence is one of the most powerful strategies to influence publics’ behaviours. Yet, there is scant attention on how personal influence is leveraged for different…

Abstract

Purpose

Personal influence is one of the most powerful strategies to influence publics’ behaviours. Yet, there is scant attention on how personal influence is leveraged for different public relations purposes in different cultural contexts. This study empirically investigates the presence and use of personal influence among Italian public relations professionals.

Design/methodology/approach

A survey was conducted through a self-administrated, web-based questionnaire and was developed from earlier studies investigating personal influence in public relations literature. Survey participants included public relations professionals across public, non-profit and private sectors.

Findings

The findings empirically show the presence and regular use of personal influence by professionals from all sectors to cultivate interpersonal relationships. Personal influence is considered a personal resource and used to leverage own influencing power. The findings also document four major manifestations of personal influence, which were named: relational closeness strategy, engagement strategy, expertise strategy and added value strategy.

Practical implications

This study enhances our understanding of personal influence in a specific cultural context and offers strategic insights for international professionals seeking to leverage influence in the socio-political environment of Italy. It also offers elements to improve public relations education and training.

Originality/value

The study offers some preliminary understandings of how Italian professionals leverage their personal influence in their daily public relations activities contributing with empirical evidence to the body of knowledge in public relations.

Details

Corporate Communications: An International Journal, vol. 29 no. 7
Type: Research Article
ISSN: 1356-3289

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Access

Only Open Access

Year

Last month (4)

Content type

1 – 4 of 4