Search results
1 – 10 of 184Mark McKenzie and Kenneth L. Bryant
Sets out to examine the dangers of money laundering as a consequence of natural disasters.
Abstract
Purpose
Sets out to examine the dangers of money laundering as a consequence of natural disasters.
Design/methodology/approach
Lists the potential abuses and scans to which unscrupulous manipulators will resort in order to profit from natural disasters.
Findings
Finds that criminal groups have established networks and sophisticated technology to effectively carry out their activities.
Originality/value
This is a detailed and eye‐opening revelation of the various criminal opportunities for money laundering spawned by natural disasters.
Details
Keywords
Abstract
Details
Keywords
Robert Behling, Chris Behling and Kenneth Sousa
Notes that as we move towards an information‐based society, information technologies will play a key role in establishing and maintaining economic competitiveness and that while…
Abstract
Notes that as we move towards an information‐based society, information technologies will play a key role in establishing and maintaining economic competitiveness and that while the systems development life cycle approach has brought some order to the software development process, information engineering brings additional structure to the process. Points out that re‐engineering techniques are used to align every area of the enterprise: people, strategy, technology and business processes. Describes software re‐engineering activities and processes with a special emphasis on developing and maintaining quality systems.
Details
Keywords
Abstract
Details
Keywords
Law enforcement social control policies over black Americans can be traced back to early policing. From the development of the “patroller” system (established in 1794 to…
Abstract
Law enforcement social control policies over black Americans can be traced back to early policing. From the development of the “patroller” system (established in 1794 to systematically police slaves) to contemporary police militarization, the relationship between black Americans and the police has been defined by bitter conflict that continuously results in outward expressions of discontent and protests. Recent examples abound, including the Los Angeles riots in the 1990s, the aftermath of the murder of Michael Brown in Ferguson, Missouri, as well as the protests sparked by the deaths of Eric Garner and Freddie Gray. Indeed, social, political, and media speculation has placed police behavior under heavy scrutiny. Questions abound regarding the fairness, appropriateness, legality, and legitimacy of police methods, as critics have accused policing agencies of adopting punitive and repressive measures that target communities of color (and act as provocation for rioting). This chapter will use a critical lens to first investigate the historical social control strategies used against communities of color by law enforcement (beginning with antebellum “beat companies” to more contemporary “broken windows” policies). Next, the author observes that, in addition to institutional evolution, police behavior (specifically related to community policing and responses to community protests) have accordingly shifted since the nineteenth century. For example, the author discusses the three current strategies of protest management (escalated force, negotiated management, and strategic incapacitation) that have all been embraced to varying degrees with relationship to police response to black community protests. Last, the author explores the iterative process of police “command and control” policies and black community protests, noting that these competing forces have “coevolved,” mirroring one another, and feature antagonistic attitudes from both sides.
Details
Keywords
Abstract
Details
Keywords
America's movement to a digital network infrastructure may be threatened by the unavailability of high‐speed network channels to some sources of information. One reason for…
Abstract
America's movement to a digital network infrastructure may be threatened by the unavailability of high‐speed network channels to some sources of information. One reason for unavailability is fear by network intermediaries that they face legal liability for carrying harmful messages. Yet changing the law to require network intermediaries to provide equal access to their services raises First Amendment questions.
Richard A. Bernardi and David F. Bean
This research is a 6-year extension of Bernardi's (2005) initial ranking of the top ethics authors in accounting; it also represents a broadening of the scope of the original data…
Abstract
This research is a 6-year extension of Bernardi's (2005) initial ranking of the top ethics authors in accounting; it also represents a broadening of the scope of the original data into accounting's top-40 journals. While Bernardi only considered publications in business-ethics journals in his initial ranking, we developed a methodology to identify ethics articles in accounting's top-40 journals. The purpose of this research is to provide a more complete list of accounting's ethics authors for use by authors, administrators, and other stakeholders. In this study, 26 business-ethics and accounting's top-40 journals were analyzed for a 23-year period between 1986 through 2008. Our data indicate that 16.8 percent of the 4,680 colleagues with either a PhD or DBA who teach accounting at North American institutions had authored/coauthored one ethics article and only 6.3 percent had authored/coauthored more than one ethics article in the 66 journals we examined. Consequently, 83.2 percent of the PhDs and DBAs in accounting had not authored/coauthored even one ethics article.