Search results

1 – 10 of 22
Article
Publication date: 6 November 2023

Simon D. Norton

This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money…

Abstract

Purpose

This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money laundering regimes of the UK and the USA.

Design/methodology/approach

The research draws upon the following sources. Firstly, statistics provided by the UK National Crime Agency, 2019 (NCA) regarding suspicious activity report (SAR) filing rates. Secondly, anti-money laundering legislation in the USA and UK. Thirdly, statements made in the political domain in the USA, particularly those which raised constitutional concerns during the progress of the Patriot Act 2001. Finally, statements and recommendations by a UK Parliamentary Commission enquiring into the effectiveness of the suspicious activity reporting regime.

Findings

The UK reporting regime does not accommodate professional judgement, resulting in the filing of SARs with limited intelligence value. This contrasts with discretionary reporting in the USA: voluntary reporting guides and influences auditor behaviour rather than mandating it. Defensive filing by UK auditors (defence to anti-money launderings [DAMLs]) has increased in recent years but the number of SARs filed has declined.

Originality/value

The study evaluates auditor behavioural responses to legislative regimes which mandate or alternatively accommodate discretion in the reporting suspicion of money laundering. Consideration of constitutional and judicial activism in this context is a novel contribution to the literature. For its theoretical framework the study uses Foucault’s concept of discipline of the self to evaluate auditor behaviour under both regimes.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Expert briefing
Publication date: 16 February 2024

These routers can compromise US critical infrastructure. This indicates that Chinese cyber operations are shifting from espionage to disruption.

Details

DOI: 10.1108/OXAN-DB285284

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 28 August 2023

Abdallah Mrindoko Ally

This paper aims to assess the legal and regulatory framework for mobile banking (M-banking) in Tanzania. The technological development in information and communication…

Abstract

Purpose

This paper aims to assess the legal and regulatory framework for mobile banking (M-banking) in Tanzania. The technological development in information and communication technologies has converted a mobile phone from a simple communication device to a very complex instrument that allows people to perform various digital transactions and extra operations such as web browsing and email reading. Such tremendous developments have brought in place the regime of M-banking. The birth of M-banking has brought legal and institutional challenges that were not anticipated before. It has complicated the traditional role of the telecommunication regulator and financial regulator in the business and caused legal gaps that need to be bridged.

Design/methodology/approach

To disclose the legal gaps and bridge them, the study used doctrinal legal method and comparative study to learn the experience of international legal instruments and policies and laws of other jurisdictions. This paper has evaluated the contribution of international legal instruments and legal frameworks of foreign jurisdictions such as Kenya and the Philippines.

Findings

It has been revealed that the prevailing laws regulating M-banking in Tanzania do not adequately address and bridge the existing legal gaps. There is a need to enact a specific law regulating M-banking and confer such powers to a specific institution to deal with regulatory issues.

Originality/value

This paper stresses the importance of enacting new laws that will offer room for financial inclusion in the digital economy and protect consumers against financial risk. It also intends to act as a catalyst and change agent in policy and legislative development in the M-banking industry. It would also bring special attention to addressing consumer rights, security and risky issues surrounding the M-banking industry. Although several other authors in Tanzania have written in this area, they have not clearly focused on disclosing the existing legal gaps resulting from the convergence of the financial and communication sectors. This paper is therefore trying to offer an extensive discussion on the legislative development in the M-banking industry in Tanzania.

Details

International Journal of Law and Management, vol. 66 no. 1
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 27 February 2024

Alan S. Marcus, Katherine A. Griffith and Francis Gary Powers Jr

In this article, we use the film Bridge of Spies – which depicts the case of U-2 spy pilot Francis Gary Powers – and relevant primary sources, particularly Powers' letters from…

Abstract

Purpose

In this article, we use the film Bridge of Spies – which depicts the case of U-2 spy pilot Francis Gary Powers – and relevant primary sources, particularly Powers' letters from prison, to provide teachers with a case that can engage students with the complexity of the Cold War. Understanding USA–Russia relations is as important today as ever as we watch the tragedy unfold in Ukraine. Using primary sources to reflect on the Cold War can help secondary students understand the historical context of the war in Ukraine as well as how to evaluate and critique sources of information about the war.

Design/methodology/approach

The film and personal letters provide insights often not available or obvious when we focus on the political or military history of an event or time period. The Cold War is frequently defined by the rhetoric of the USA and Union of Soviet Socialist Republics (USSR) governments – but everyday people and citizens had a wider range of views and experiences. The film and letters bring out the humanity of the Cold War.

Findings

This article supports secondary teachers in incorporating film and primary sources as teaching tools to study the Cold War while more broadly thinking about these sources as ways to understand the past. The letters used, including those from U-2 spy pilot Francis Gary Powers, help us understand his time in a Soviet prison as well as the behind-the-scenes work to free him as part of a prisoner exchange.

Originality/value

The U-2 Incident and other events of the Cold War provide important context for understanding the Cold War-like tensions between the USA and Russia today. The distrust between these countries has a long history. However, documents like the film and letters discussed here show that there is much more to the bluster of political leaders and the military chess game. There is an important human element to these events and an impact on individuals who are much more than pawns in international diplomacy.

Details

Social Studies Research and Practice, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1933-5415

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

20

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. 30 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Executive summary
Publication date: 7 May 2024

CANADA: Foreign interference report prompts action

Details

DOI: 10.1108/OXAN-ES286857

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 15 April 2024

UNITED STATES: Surveillance renewal will boost speaker

Details

DOI: 10.1108/OXAN-ES286426

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 1 March 2024

This leak included corporate documents and internal communications, and detailed a suite of spyware applications developed by Shanghai-based cybersecurity company I-Soon, a…

Expert briefing
Publication date: 3 April 2024

Islamabad said the strikes were aimed at anti-Pakistan militants, but the Taliban described the action as “reckless” and retaliated by firing at Pakistani troops along the border…

Article
Publication date: 7 May 2024

Richard Kapend, Mark Button and Peter Stiernstedt

A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional…

Abstract

Purpose

A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional services firms such as firms of accountants who also charge fees, in-house investigators employed by private organisations and in-house investigators of public sector organisations who are not sworn police officers. Some of these investigators, such as private investigators, have been exposed in unethical activities such as illegal surveillance and blagging to name some. In this respect, this study aims to uncover the ethical orientations of investigators using cluster analysis.

Design/methodology/approach

This study is based upon an online survey of private investigators predominantly in the UK, i.e. investigators beyond the public police. An innovate statistical inferential analysis was used to investigate the sample which resulted in the development of three ethical orientations of such investigators.

Findings

Based upon a survey response from 331 of these types of investigators this study illustrates the extent they engage in unethical activities, showing a very small minority of largely private investigators who engage in such activities.

Originality/value

A unique feature of this study is the use of an innovative statistical approach using an unsupervised machine learning model, namely, TwoStep cluster analysis, to successfully group and classify respondents based on their ethical orientation. The model derived three types of ethical orientation: ethical, inbetweeners and risk takers.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of 22