Search results

1 – 7 of 7
Article
Publication date: 6 November 2023

Simon D. Norton

This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money…

Abstract

Purpose

This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money laundering regimes of the UK and the USA.

Design/methodology/approach

The research draws upon the following sources. Firstly, statistics provided by the UK National Crime Agency, 2019 (NCA) regarding suspicious activity report (SAR) filing rates. Secondly, anti-money laundering legislation in the USA and UK. Thirdly, statements made in the political domain in the USA, particularly those which raised constitutional concerns during the progress of the Patriot Act 2001. Finally, statements and recommendations by a UK Parliamentary Commission enquiring into the effectiveness of the suspicious activity reporting regime.

Findings

The UK reporting regime does not accommodate professional judgement, resulting in the filing of SARs with limited intelligence value. This contrasts with discretionary reporting in the USA: voluntary reporting guides and influences auditor behaviour rather than mandating it. Defensive filing by UK auditors (defence to anti-money launderings [DAMLs]) has increased in recent years but the number of SARs filed has declined.

Originality/value

The study evaluates auditor behavioural responses to legislative regimes which mandate or alternatively accommodate discretion in the reporting suspicion of money laundering. Consideration of constitutional and judicial activism in this context is a novel contribution to the literature. For its theoretical framework the study uses Foucault’s concept of discipline of the self to evaluate auditor behaviour under both regimes.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

27

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. 30 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Executive summary
Publication date: 7 May 2024

CANADA: Foreign interference report prompts action

Details

DOI: 10.1108/OXAN-ES286857

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 7 May 2024

Richard Kapend, Mark Button and Peter Stiernstedt

A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional…

Abstract

Purpose

A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional services firms such as firms of accountants who also charge fees, in-house investigators employed by private organisations and in-house investigators of public sector organisations who are not sworn police officers. Some of these investigators, such as private investigators, have been exposed in unethical activities such as illegal surveillance and blagging to name some. In this respect, this study aims to uncover the ethical orientations of investigators using cluster analysis.

Design/methodology/approach

This study is based upon an online survey of private investigators predominantly in the UK, i.e. investigators beyond the public police. An innovate statistical inferential analysis was used to investigate the sample which resulted in the development of three ethical orientations of such investigators.

Findings

Based upon a survey response from 331 of these types of investigators this study illustrates the extent they engage in unethical activities, showing a very small minority of largely private investigators who engage in such activities.

Originality/value

A unique feature of this study is the use of an innovative statistical approach using an unsupervised machine learning model, namely, TwoStep cluster analysis, to successfully group and classify respondents based on their ethical orientation. The model derived three types of ethical orientation: ethical, inbetweeners and risk takers.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 30 April 2024

Shing-Ling S. Chen, Zhuojun Joyce Chen and Courtney Styron

In August, 2015, Serena Williams, one of the most successful female athletes of all time, was body shamed in a New York Times article. The incident highlights the issue of unequal…

Abstract

In August, 2015, Serena Williams, one of the most successful female athletes of all time, was body shamed in a New York Times article. The incident highlights the issue of unequal treatment of male and female athletes – while a muscular frame enhances masculinity for male athletes, a muscular physique invites body shaming for female athletes. In this study, symbolic interactionist theories regarding the generalized other are called into question. While George Mead's theorizing exhibits a nonproblematic role taking of the generalized other in a cooperative manner, this study reports the presence of paradoxical generalized others, and consequently, the incongruent role taking of a latent generalized other by individuals. This study investigates if the issue of body image exists among college female athletes, if college female athletes experience the dilemma of choosing between outstanding performance with a muscular frame or maintaining traditional female appearance. To provide answers to the question, female athletes in a midwest university were invited to fill out a survey. The survey results confirm the existence of a paradox between performance and appearance among some college female athletes.

Details

Symbolic Interaction and Inequality
Type: Book
ISBN: 978-1-83797-689-8

Keywords

Article
Publication date: 7 September 2023

John Calabrese

The purpose of this paper is to investigate the trend of transatlantic strategic convergence and policy coordination in response to Chinese trade practices and technological…

Abstract

Purpose

The purpose of this paper is to investigate the trend of transatlantic strategic convergence and policy coordination in response to Chinese trade practices and technological competition, specifically in the critical minerals sector.

Design/methodology/approach

The research draws on primary and secondary source material to identify evidence of and examine the drivers, manifestations and prospects for effective US-European efforts to advance the shared aim of reducing vulnerabilities in critical minerals supply chains.

Findings

The interests of the USA and Europe would be best served by prioritizing their own security, diversification and resilience strategies while seeking areas of common ground and constructive engagement with China.

Research limitations/implications

The research offers a fresh perspective on the growing alignment and persistent gaps in US and European perspectives on China’s rising influence and assertive behavior.

Originality/value

The research highlights the vital role of critical minerals in national security, economic competitiveness, technological advancement and sustainable resource management. It underscores the shared recognition on both sides of the Atlantic that securing a stable supply of critical minerals – essential for maintaining strategic capabilities, driving innovation and ensuring long-term economic prosperity – necessitates tighter transatlantic coordination as well as constructive engagement with China.

Details

Social Transformations in Chinese Societies, vol. 20 no. 1
Type: Research Article
ISSN: 1871-2673

Keywords

Expert briefing
Publication date: 22 April 2024

Although criticisms targeting the DSS are long-standing, no recent Nigerian government has attempted major intelligence reforms.

Details

DOI: 10.1108/OXAN-DB286573

ISSN: 2633-304X

Keywords

Geographic
Topical
1 – 7 of 7