Search results

1 – 10 of over 316000
Article
Publication date: 1 July 2004

Fletcher N. Baldwin

Argues in this wideranging paper that the legitimacy of international law depends on the principle that pacts should be respected, reviewing the issues of self‐preservation…

Abstract

Argues in this wideranging paper that the legitimacy of international law depends on the principle that pacts should be respected, reviewing the issues of self‐preservation, proportionality and human rights in relation to this. Focuses on the economic war against terrorism by the USA preeminently, as expressed in the PATRIOT Act and the International Emergency Economic Powers Act and the Anti‐Terrorism and Effective Death Penalty Act. Concludes that the Patriot Act and the Homeland Security Act give the Executive branch of government extraordinary and warlike powers: but wars have an end whereas terrorism does not. Looks at the role of the US Federal courts in the context of national security, proportionality and human rights concerns, and finds them deficient; reports specific cases concerning Iranian resistance movements and their status as regards terrorism, and the Bajkajian, Austin and Alexander cases as regards proportionality.

Details

Journal of Money Laundering Control, vol. 7 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 31 December 2004

Fletcher N. Baldwin

Begins with the Staff Report to the National Commission on Terrorist Attack on the United States, which indicates the methods used to trace, seize and freeze terrorist assets, and…

Abstract

Begins with the Staff Report to the National Commission on Terrorist Attack on the United States, which indicates the methods used to trace, seize and freeze terrorist assets, and the informal methods used by al‐Qaeda to transfer money. Questions the amount of progress made since September 11 to freeze funds. Focuses on encryption technology and how it allows illegal use of the Internet in the form of cyber laundering and e‐cash, and on the move by terrorists into narcotics production and trafficking ‐ which is defined as nacre‐terrorism. Describes efforts to proscribe cyber crime, including cyber laundering and cyber terrorism, including controls on privacy and encryption. Shows how business corporations can become involved with terrorism, including a case study on tanzanite.

Details

Journal of Money Laundering Control, vol. 8 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 16 April 2024

Claude Diderich

In demand-driven markets, customer value, sometimes called perceived use value or consumer surplus, is defined by the customer rather than the firm. The value a firm can…

Abstract

Purpose

In demand-driven markets, customer value, sometimes called perceived use value or consumer surplus, is defined by the customer rather than the firm. The value a firm can appropriate, its profits, is driven by the customer’s willingness to pay for the value they receive, adjusted by costs. This paper introduces a conceptual framework that helps understand value creation and appropriation in demand-driven markets and shows how to influence them through strategic decision-making.

Design/methodology/approach

This paper uses an axiomatic approach combined with an extended analytical formulation of the jobs-to-be-done framework to contextualise demand-driven markets. It mathematically derives implications for managerial decision-making concerning selecting customer segments, optimising customer value creation and maximising firm value appropriation in a competitive environment.

Findings

Rooting strategic decision-making in the jobs-to-be-done framework allows distinguishing between what customers want to achieve (goal), what product attributes need to be satisfied (opportunity space/constraints) and what value creation criteria related to features are important (utility function). This paper shows that starting from a job-to-be-done, the problem of identifying which customer segments to serve, what product to offer and what price to charge, can be formulated as an optimisation problem that simultaneously (rather than sequentially) solves for the three decision variables, customer segments, product features and price, by maximising the value that a firm can appropriate, subject to maximising customer value creation and constrained by the competitive environment.

Practical implications

Applying the derived results to simultaneously deciding which customer segments to target, what product features to offer and what price to charge, given a set of competing products, allows managers to increase their chances of winning the competitive game.

Originality/value

This paper shows that starting from a job-to-be-done and simultaneously focusing on customers, product features, price and competitors enhances firm profitability. Strategic decision-making is formulated as an optimisation problem based on an axiomatic approach contextualising demand-driven markets.

Details

Journal of Strategy and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1755-425X

Keywords

Article
Publication date: 1 July 2003

David Lusty

Examines the use of taxation as an alternative means of bringing otherwise untouchable criminals to justice and putting their businesses out of action, focusing on Australia and…

1069

Abstract

Examines the use of taxation as an alternative means of bringing otherwise untouchable criminals to justice and putting their businesses out of action, focusing on Australia and the USA as countries which have achieved success through innovative use of taxation laws. Looks at the blind eye that the UK Inland Revenue has historically turned towards taxing illicit income, and recent reforms in the shape of the Proceeds of Crime Bill Part VI. Details the pioneering work of the US Internal Revenue Service’s Criminal Investigation Division, beginning in 1920 and continued by Senator Kefauver and Attorney‐General Robert Kennedy, with the war on drugs ongoing today; criminal tax weapons include proven tax deficiency and wilfulness, while civil tax weapons include income reconstruction, deficiency determinations, and jeopardy and termination assessments. Moves on to Australia’s Woodward, Williams and Costigan Royal Commissions, Special Prosecutor Robert Redlich, the National Crime Authority, and the Swordfish task force; criminal tax weapons of the Australian Tax Office include public fraud offences, while civil tax weapons include information‐gathering powers, default assessment, tax collection powers and procedures.

Details

Journal of Financial Crime, vol. 10 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Content available
Book part
Publication date: 28 February 2017

Abstract

Details

Engaging Dissonance: Developing Mindful Global Citizenship in Higher Education
Type: Book
ISBN: 978-1-78714-154-4

Content available
Book part
Publication date: 17 March 2022

Abstract

Details

Innovative Approaches in Pedagogy for Higher Education Classrooms
Type: Book
ISBN: 978-1-80043-256-7

Content available
Book part
Publication date: 23 October 2020

Abstract

Details

International Perspectives on Policies, Practices & Pedagogies for Promoting Social Responsibility in Higher Education
Type: Book
ISBN: 978-1-83909-854-3

Abstract

Details

The Handbook of Road Safety Measures
Type: Book
ISBN: 978-1-84855-250-0

Book part
Publication date: 19 October 2020

Hon Ho Kwok

This chapter develops a set of two-step identification methods for social interactions models with unknown networks, and discusses how the proposed methods are connected to the…

Abstract

This chapter develops a set of two-step identification methods for social interactions models with unknown networks, and discusses how the proposed methods are connected to the identification methods for models with known networks. The first step uses linear regression to identify the reduced forms. The second step decomposes the reduced forms to identify the primitive parameters. The proposed methods use panel data to identify networks. Two cases are considered: the sample exogenous vectors span Rn (long panels), and the sample exogenous vectors span a proper subspace of Rn (short panels). For the short panel case, in order to solve the sample covariance matrices’ non-invertibility problem, this chapter proposes to represent the sample vectors with respect to a basis of a lower-dimensional space so that we have fewer regression coefficients in the first step. This allows us to identify some reduced form submatrices, which provide equations for identifying the primitive parameters.

Article
Publication date: 12 January 2024

Pengyun Zhao, Shoufeng Ji and Yuanyuan Ji

This paper aims to introduce a novel structure for the physical internet (PI)–enabled sustainable supplier selection and inventory management problem under uncertain environments.

Abstract

Purpose

This paper aims to introduce a novel structure for the physical internet (PI)–enabled sustainable supplier selection and inventory management problem under uncertain environments.

Design/methodology/approach

To address hybrid uncertainty both in the objective function and constraints, a novel interactive hybrid multi-objective optimization solution approach combining Me-based fuzzy possibilistic programming and interval programming approaches is tailored.

Findings

Various numerical experiments are introduced to validate the feasibility of the established model and the proposed solution method.

Originality/value

Due to its interconnectedness, the PI has the opportunity to support firms in addressing sustainability challenges and reducing initial impact. The sustainable supplier selection and inventory management have become critical operational challenges in PI-enabled supply chain problems. This is the first attempt on this issue, which uses the presented novel interactive possibilistic programming method.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of over 316000