Search results

1 – 10 of 39
Article
Publication date: 10 April 2024

Thomas Wojciechowski

While prior research has established that traumatic brain injury (TBI) is a risk factor for violent offending, there is little understanding of mechanisms that may underpin this…

Abstract

Purpose

While prior research has established that traumatic brain injury (TBI) is a risk factor for violent offending, there is little understanding of mechanisms that may underpin this relationship. This is problematic, as a better understanding of these mechanisms could facilitate more effective targeting of treatment. This study aims to address these gaps in the extant literature by examining TBI as a predictor of violent offending and test for mediation effects through cognitive constructs of dual systems imbalance and hostility among a sample of justice-involved youth (JIY).

Design/methodology/approach

The Pathways to Desistance data were analyzed. The first three waves of this data set comprising the responses of 1,354 JIY were analyzed. Generalized structural equation modeling was used to test for direct and indirect effects of interest. A bootstrap resampling process was used to compute unbiased standard errors for determining the statistical significance of mediation effects.

Findings

Lifetime experience of TBI was associated with increased violent offending frequency at follow-up. Hostility significantly mediated this relationship, but dual systems imbalance did not. This indicated that programming focused on reducing hostility among JIY who have experienced TBI could aid in reducing violent recidivism rates.

Originality/value

To the best of the author’s knowledge, this study was the first to identify significant mediation of the relationship between TBI and violent offending through hostility.

Details

Journal of Criminal Psychology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 26 March 2024

Abba Ya'u, Mohammed Abdullahi Umar, Nasiru Yunusa and Dhanuskodi Rengasamy

Most research on tax evasion focused on microeconomic variables revolving around perceptions and decisions of individual taxpayers. However, a new wave of research is now…

Abstract

Purpose

Most research on tax evasion focused on microeconomic variables revolving around perceptions and decisions of individual taxpayers. However, a new wave of research is now investigating the role of macroeconomic variables in inducing tax evasion. This study adds to the limited studies in this new direction of research. Previous studies found that inflation, low gross domestic product (GDP) growth and gross fixed capital formation causes recession, increases unemployment, raise interest rates, hurts both domestic and foreign direct investments. This study examined the relationship between these variables and estimated tax evasion in Sub-Saharan Africa.

Design/methodology/approach

The study adopts a correlation research design with 2,300 data points collected from 23 countries in Sub-Saharan Africa. Specifically, tax to GDP ratio, gross fixed capital formation per GDP and the GDP annual growth report from each country for the period 2011–2020 was retrieved. Generalised least square regression technique was employed to analyse the data due to the presence of heteroskedasticity in the model and random effect was utilized based on the Hausman test. To avoid misspecification and biased result; therefore, all relevant test was conducted including the multicollinearity test.

Findings

The results indicate that GDP annual growth and gross fixed capital formation have a significant negative impact on estimated tax evasion in Sub-Saharan Africa. The findings further indicate a negative but insignificant relationship between inflation and estimated tax evasion in Sub-Saharan Africa. The study concludes that both GDP annual growth rate and gross fixed capital formation negatively influence estimated tax evasion and the policy implications in the African continent were discussed.

Originality/value

The new findings on the effects of GDP annual growth, growth fixed capital formation and inflation on estimated tax evasion provide novel knowledge that is currently lacking in the current literature, specifically Sub-Saharan African continent.

Details

African Journal of Economic and Management Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-0705

Keywords

Article
Publication date: 24 April 2024

Jan Mei Soon-Sinclair, Rounaq Nayak and Louise Manning

The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used…

Abstract

Purpose

The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used linear approaches to examine the root causes of the melamine milk scandal.

Design/methodology/approach

In the present study, we applied a systems approach to the melamine milk scandal to identify the complex systems-level failures across the supply chain leading to the incident and why food fraud incidents such as this occurred in the dairy sector. Additionally, systemic failures associated with food fraud vulnerability factors were considered (i.e. opportunities, motivation and control measures).

Findings

48 contributory factors of influence were identified and grouped across six sociotechnical levels across the Chinese dairy system, from government to equipment and surroundings. Lack of vertical integration (processes and communication) contributed to the failure. When viewed from a broader perspective, the melamine milk scandal can be linked to a series of human errors and organisational issues associated with government bodies, the dairy supply chain, individual organisations and management decisions and individual actions of staff or processes.

Practical implications

This approach is of value to policymakers and the industry as it supports public health investigations of food fraud incidents and proactive food safety management.

Originality/value

To the best of our knowledge, this is the first study to analyse a food safety or fraud incident using the AcciMap approach and the food fraud vulnerability assessment (FFVA) technique. AcciMap analysis is applied to both unintentional and intentional aspects of the incident.

Details

British Food Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0007-070X

Keywords

Article
Publication date: 28 March 2024

Dean Wilkinson, Isha Chopra and Sophie Badger

Knife crime and serious violent crime (SVC) among youth has been growing at an alarming rate in the UK (Harding and Allen, 2021). Community and school-based intervention and…

Abstract

Purpose

Knife crime and serious violent crime (SVC) among youth has been growing at an alarming rate in the UK (Harding and Allen, 2021). Community and school-based intervention and prevention services to tackle knife crime are being developed with some evaluation; however, these are independent and of varied quality and rigour. Therefore, the purpose of this study is to record the approaches being developed and synthesise existing evidence of the impact and effectiveness of programmes to reduce knife crime. In addition, the complex factors contributing to knife crime and SVC are discussed.

Design/methodology/approach

A systematic approach was used to conduct this knife crime intervention evidence review using two search engines and four databases. Inclusion and exclusion criteria were applied to ensure focus and relevance. The results of searches and decisions by the research team were recorded at each stage using Preferred Reporting Items for systematic reviews and meta-analyses (PRISMA).

Findings

Some evidence underpins the development of services to reduce knife crime. Much of the evidence comes from government funded project reports, intervention and prevention services reports, with few studies evaluating the efficacy of intervention programmes at present. Some studies that measured immediate impact in line with the programme’s aims were found and demonstrated positive results.

Originality/value

This systematic review specifically synthesised the evidence and data derived from knife crime and weapon carrying interventions and preventions, integrating both grey and published literature, with a novel discussion that highlights the importance of outcome evaluations and issues with measuring the success of individual level interventions and their contributions to the overall reduction of violence.

Details

Journal of Criminal Psychology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 2 April 2024

Farjam Eshraghian, Najmeh Hafezieh, Farveh Farivar and Sergio de Cesare

The applications of Artificial Intelligence (AI) in various areas of professional and knowledge work are growing. Emotions play an important role in how users incorporate a…

Abstract

Purpose

The applications of Artificial Intelligence (AI) in various areas of professional and knowledge work are growing. Emotions play an important role in how users incorporate a technology into their work practices. The current study draws on work in the areas of AI-powered technologies adaptation, emotions, and the future of work, to investigate how knowledge workers feel about adopting AI in their work.

Design/methodology/approach

We gathered 107,111 tweets about the new AI programmer, GitHub Copilot, launched by GitHub and analysed the data in three stages. First, after cleaning and filtering the data, we applied the topic modelling method to analyse 16,130 tweets posted by 10,301 software programmers to identify the emotions they expressed. Then, we analysed the outcome topics qualitatively to understand the stimulus characteristics driving those emotions. Finally, we analysed a sample of tweets to explore how emotional responses changed over time.

Findings

We found six categories of emotions among software programmers: challenge, achievement, loss, deterrence, scepticism, and apathy. In addition, we found these emotions were driven by four stimulus characteristics: AI development, AI functionality, identity work, and AI engagement. We also examined the change in emotions over time. The results indicate that negative emotions changed to more positive emotions once software programmers redirected their attention to the AI programmer's capabilities and functionalities, and related that to their identity work.

Practical implications

Overall, as organisations start adopting AI-powered technologies in their software development practices, our research offers practical guidance to managers by identifying factors that can change negative emotions to positive emotions.

Originality/value

Our study makes a timely contribution to the discussions on AI and the future of work through the lens of emotions. In contrast to nascent discussions on the role of AI in high-skilled jobs that show knowledge workers' general ambivalence towards AI, we find knowledge workers show more positive emotions over time and as they engage more with AI. In addition, this study unveils the role of professional identity in leading to more positive emotions towards AI, as knowledge workers view such technology as a means of expanding their identity rather than as a threat to it.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 26 January 2024

Faris ALshubiri and Mawih Kareem Al Ani

This study aims to analyse the intellectual property rights (INPR), foreign direct investment (FDI) inflows and technological exports of 32 developing and developed countries for…

Abstract

Purpose

This study aims to analyse the intellectual property rights (INPR), foreign direct investment (FDI) inflows and technological exports of 32 developing and developed countries for the period of 2006–2020.

Design/methodology/approach

Diagnostic tests were used to confirm the panel least squares, fixed effect, random effect, feasible general least squares, dynamic ordinary least squares and fully modified ordinary least squares estimator results as well as to increase the robustness.

Findings

According to the findings for the developing countries, trademark, patent and industrial design applications, each had a significant positive long-run effect on FDI inflows. In addition, there was a significant positive long-run relationship between patent applications and medium- and high-technology exports. Meanwhile, trademark and industrial design applications had a significant negative long-term effect on medium- and high-technology exports. In developed countries, patent and industrial design applications each have a significant negative long-term on medium- and high-technology exports. Furthermore, patent and trademark applications each had a significant negative long-run effect on FDI inflows.

Originality/value

This study contributes significantly to the focus that host countries evaluate the technology gaps between domestic and foreign investors at different industry levels to select the best INPR rules and innovation process by increasing international cooperation. Furthermore, the host countries should follow the structure–conduct–performance paradigm based on analysis of the market structure, strategic firms and industrial dynamics systems.

Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 April 2024

Tim Wright, Zainab Ruhwanya and Jacques Ophoff

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a…

Abstract

Purpose

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a noteworthy surge due to the increased utilisation of cyberspace. The abrupt transition to telecommuting altered the interpersonal dynamics inherent in traditional work environments. This paper aims to examine the impact of interpersonal factors on the cybercrime preventative measures adopted by telecommuting employees.

Design/methodology/approach

A conceptual model, grounded in the Theory of Interpersonal Behaviour, is evaluated through an online survey. The data set comprises responses from 209 employees in South Africa, and the analysis uses partial least squares structural equation modelling.

Findings

The results reveal substantial predictive power to explain cybercrime preventative behaviours. Notably, the study underscores the significant influence of habit and affect on intention and subsequent behaviour.

Practical implications

The results suggest that practitioners should give due attention to emotional dimensions (affect) as a catalyst for information security behaviour. The formulation of employees’ information security responsibilities should be pragmatic, fostering subconscious compliance to establish routine behaviour (habit).

Originality/value

This research underscores the pivotal roles played by habit and emotions in shaping behavioural patterns related to information security. Furthermore, it provides researchers with an illustrative model for operationalising these constructs within the realm of security. The results contribute additional perspectives on the repercussions of the COVID-19 pandemic on cybercrime preventative behaviours.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 5 April 2024

Alexander Conrad Culley

The purpose of this paper is to scrutinise the effectiveness of four derivative exchanges’ enforcement efforts since 2007. These exchanges include the Commodity Exchange Inc. and…

Abstract

Purpose

The purpose of this paper is to scrutinise the effectiveness of four derivative exchanges’ enforcement efforts since 2007. These exchanges include the Commodity Exchange Inc. and ICE Futures US from the United States and ICE Futures Europe and the London Metal Exchange from the UK.

Design/methodology/approach

The paper examines 799 enforcement notices published by four exchanges through a behavioural science lens: HUMANS conceived by Hunt (2023) in Humanizing Rules: Bringing Behavioural Science to Ethics and Compliance.

Findings

The paper finds the effectiveness of the exchanges’ enforcement efforts to be a mixed picture as financial markets transition from the digital to artificial intelligence era. Humans remain a key cog in the wheel of market participants’ trading operations, albeit their roles have changed. Despite this, some elements of exchanges’ enforcement regimes have not kept pace with the move from floor to remote trading. However, in other respects, their efforts are or should be, effective, at least in behavioural terms.

Research limitations/implications

The paper’s findings are arguably limited to exchanges based in Anglophone jurisdictions. The information published by the exchanges is variable, making “like-for-like” comparisons difficult in some areas.

Practical implications

The paper makes several recommendations that, if adopted, could help exchanges to increase the potency of their enforcement programmes.

Originality/value

A key aim of the paper is to shift the lens through which the debate concerning the efficacy of exchange-level oversight is conducted. Hitherto, a legal lens has been used, whereas this paper uses a behavioural lens.

Details

Journal of Financial Regulation and Compliance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1358-1988

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 39