Search results
1 – 10 of 22This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money…
Abstract
Purpose
This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money laundering regimes of the UK and the USA.
Design/methodology/approach
The research draws upon the following sources. Firstly, statistics provided by the UK National Crime Agency, 2019 (NCA) regarding suspicious activity report (SAR) filing rates. Secondly, anti-money laundering legislation in the USA and UK. Thirdly, statements made in the political domain in the USA, particularly those which raised constitutional concerns during the progress of the Patriot Act 2001. Finally, statements and recommendations by a UK Parliamentary Commission enquiring into the effectiveness of the suspicious activity reporting regime.
Findings
The UK reporting regime does not accommodate professional judgement, resulting in the filing of SARs with limited intelligence value. This contrasts with discretionary reporting in the USA: voluntary reporting guides and influences auditor behaviour rather than mandating it. Defensive filing by UK auditors (defence to anti-money launderings [DAMLs]) has increased in recent years but the number of SARs filed has declined.
Originality/value
The study evaluates auditor behavioural responses to legislative regimes which mandate or alternatively accommodate discretion in the reporting suspicion of money laundering. Consideration of constitutional and judicial activism in this context is a novel contribution to the literature. For its theoretical framework the study uses Foucault’s concept of discipline of the self to evaluate auditor behaviour under both regimes.
Details
Keywords
These routers can compromise US critical infrastructure. This indicates that Chinese cyber operations are shifting from espionage to disruption.
Details
DOI: 10.1108/OXAN-DB285284
ISSN: 2633-304X
Keywords
Geographic
Topical
This paper aims to assess the legal and regulatory framework for mobile banking (M-banking) in Tanzania. The technological development in information and communication…
Abstract
Purpose
This paper aims to assess the legal and regulatory framework for mobile banking (M-banking) in Tanzania. The technological development in information and communication technologies has converted a mobile phone from a simple communication device to a very complex instrument that allows people to perform various digital transactions and extra operations such as web browsing and email reading. Such tremendous developments have brought in place the regime of M-banking. The birth of M-banking has brought legal and institutional challenges that were not anticipated before. It has complicated the traditional role of the telecommunication regulator and financial regulator in the business and caused legal gaps that need to be bridged.
Design/methodology/approach
To disclose the legal gaps and bridge them, the study used doctrinal legal method and comparative study to learn the experience of international legal instruments and policies and laws of other jurisdictions. This paper has evaluated the contribution of international legal instruments and legal frameworks of foreign jurisdictions such as Kenya and the Philippines.
Findings
It has been revealed that the prevailing laws regulating M-banking in Tanzania do not adequately address and bridge the existing legal gaps. There is a need to enact a specific law regulating M-banking and confer such powers to a specific institution to deal with regulatory issues.
Originality/value
This paper stresses the importance of enacting new laws that will offer room for financial inclusion in the digital economy and protect consumers against financial risk. It also intends to act as a catalyst and change agent in policy and legislative development in the M-banking industry. It would also bring special attention to addressing consumer rights, security and risky issues surrounding the M-banking industry. Although several other authors in Tanzania have written in this area, they have not clearly focused on disclosing the existing legal gaps resulting from the convergence of the financial and communication sectors. This paper is therefore trying to offer an extensive discussion on the legislative development in the M-banking industry in Tanzania.
Alan S. Marcus, Katherine A. Griffith and Francis Gary Powers Jr
In this article, we use the film Bridge of Spies – which depicts the case of U-2 spy pilot Francis Gary Powers – and relevant primary sources, particularly Powers' letters from…
Abstract
Purpose
In this article, we use the film Bridge of Spies – which depicts the case of U-2 spy pilot Francis Gary Powers – and relevant primary sources, particularly Powers' letters from prison, to provide teachers with a case that can engage students with the complexity of the Cold War. Understanding USA–Russia relations is as important today as ever as we watch the tragedy unfold in Ukraine. Using primary sources to reflect on the Cold War can help secondary students understand the historical context of the war in Ukraine as well as how to evaluate and critique sources of information about the war.
Design/methodology/approach
The film and personal letters provide insights often not available or obvious when we focus on the political or military history of an event or time period. The Cold War is frequently defined by the rhetoric of the USA and Union of Soviet Socialist Republics (USSR) governments – but everyday people and citizens had a wider range of views and experiences. The film and letters bring out the humanity of the Cold War.
Findings
This article supports secondary teachers in incorporating film and primary sources as teaching tools to study the Cold War while more broadly thinking about these sources as ways to understand the past. The letters used, including those from U-2 spy pilot Francis Gary Powers, help us understand his time in a Soviet prison as well as the behind-the-scenes work to free him as part of a prisoner exchange.
Originality/value
The U-2 Incident and other events of the Cold War provide important context for understanding the Cold War-like tensions between the USA and Russia today. The distrust between these countries has a long history. However, documents like the film and letters discussed here show that there is much more to the bluster of political leaders and the military chess game. There is an important human element to these events and an impact on individuals who are much more than pawns in international diplomacy.
Details
Keywords
Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre
Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…
Abstract
Purpose
Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.
Design/methodology/approach
This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.
Findings
Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.
Originality/value
To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.
Details
Keywords
CANADA: Foreign interference report prompts action
Details
DOI: 10.1108/OXAN-ES286857
ISSN: 2633-304X
Keywords
Geographic
Topical
UNITED STATES: Surveillance renewal will boost speaker
Details
DOI: 10.1108/OXAN-ES286426
ISSN: 2633-304X
Keywords
Geographic
Topical
This leak included corporate documents and internal communications, and detailed a suite of spyware applications developed by Shanghai-based cybersecurity company I-Soon, a…
Details
DOI: 10.1108/OXAN-DB285558
ISSN: 2633-304X
Keywords
Geographic
Topical
Islamabad said the strikes were aimed at anti-Pakistan militants, but the Taliban described the action as “reckless” and retaliated by firing at Pakistani troops along the border…
Details
DOI: 10.1108/OXAN-DB286205
ISSN: 2633-304X
Keywords
Geographic
Topical
Richard Kapend, Mark Button and Peter Stiernstedt
A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional…
Abstract
Purpose
A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional services firms such as firms of accountants who also charge fees, in-house investigators employed by private organisations and in-house investigators of public sector organisations who are not sworn police officers. Some of these investigators, such as private investigators, have been exposed in unethical activities such as illegal surveillance and blagging to name some. In this respect, this study aims to uncover the ethical orientations of investigators using cluster analysis.
Design/methodology/approach
This study is based upon an online survey of private investigators predominantly in the UK, i.e. investigators beyond the public police. An innovate statistical inferential analysis was used to investigate the sample which resulted in the development of three ethical orientations of such investigators.
Findings
Based upon a survey response from 331 of these types of investigators this study illustrates the extent they engage in unethical activities, showing a very small minority of largely private investigators who engage in such activities.
Originality/value
A unique feature of this study is the use of an innovative statistical approach using an unsupervised machine learning model, namely, TwoStep cluster analysis, to successfully group and classify respondents based on their ethical orientation. The model derived three types of ethical orientation: ethical, inbetweeners and risk takers.
Details