Search results

1 – 10 of 740
Article
Publication date: 4 July 2023

Benjamin Scott

This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It…

Abstract

Purpose

This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It explores the ethical and professional considerations of investigative journalists, how they approach privacy and information-sharing and how this differs from intelligence practice in government and industry. The paper assesses the strengths and limitations of Collaborative Investigative Reporting based on Information Leaks (CIRIL) as a kind of public-facing intelligence practice.

Design/methodology/approach

This study draws on academic literature, source material from investigations by the International Consortium of Investigative Journalists and the Organised Crime and Corruption Reporting Project, and a survey of financial crime compliance professionals conducted in 2022.

Findings

The paper identifies three key causal factors that have enabled the rise of CIRIL even as traditional journalism has declined: the digital storage of information; increasing public interest in offshore finance and tax evasion; and “virtual newsrooms” enabled by internet communications. It concludes that the primary strength of CIRIL is its creation of complex global narratives to inform the public about corruption and tax evasion, while its key weakness is that the scale and breadth of the data released makes it difficult to focus on likely criminal activity. Results of a survey of industry and government professionals indicate that CIRIL is generally more effective as public information than as an investigative resource, owing to the volume, age and quality of information released. However, the trends enabling CIRIL are likely to continue, and this means that governments and financial institutions need to become more effective at using leaked information.

Originality/value

Over the past decade, large-scale, data-driven investigative journalism projects such as the Pandora Papers and the Russian Laundromat have had a significant public impact by exposing money laundering, financial crime and corruption. These projects share certain hallmarks: the use of human intelligence, often sourced from anonymous leaks; inventive fusion of this intelligence with data from open sources; and collaboration among a global collective of investigative journalists to build a narrative. These projects prioritise informing the public. They are also an important information source for government and private sector organisations working to investigate and disrupt financial crime.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Expert briefing
Publication date: 1 March 2024

This leak included corporate documents and internal communications, and detailed a suite of spyware applications developed by Shanghai-based cybersecurity company I-Soon, a…

Article
Publication date: 4 August 2023

Argaw Gurmu and Pabasara Wijeratne Mudiyanselage

Most residential building owners often report problems associated with the plumbing systems. If identified at the early stages, plumbing-related defects can be easily repaired…

Abstract

Purpose

Most residential building owners often report problems associated with the plumbing systems. If identified at the early stages, plumbing-related defects can be easily repaired. However, if unnoticed for a long period of time, they could lead to major damages and incur a significant cost to repair. Despite the problems, studies investigating plumbing anomalies and their root causes in residential buildings are limited. This study aims to explore plumbing defects and their potential causes, diagnosis methods and repair techniques in residential buildings.

Design/methodology/approach

This research used data collected through an extensive survey of both academic and grey literature. Through the content analysis, plumbing defects and the associated causes have been identified and presented in tabular format.

Findings

The study investigated the anomalies and causes in the residential plumbing system under five key sub-systems: water supply system; sanitary plumbing system; roof drainage system; heating, ventilation, air conditioning and gas system; and swimming pool. Accordingly, some of the identified plumbing defects include leakages, corrosion, water penetration, slow drainage and cracks. Damaged pipes, faulty equipment and installations are some of the common causes of the anomalies. Visual inspection, hydrostatic pressure test, thermography, high-tech pipe cameras, infrared cameras, leak noise correlators and leak loggers are techniques used for diagnosing anomalies. Reactive, preventive, predictive and reliability-centred maintenance strategies are identified to control or prevent anomalies.

Originality/value

The findings of this research can be used as a useful tool or guideline for contractors, plumbers, facilities managers and building surveyors to identify and rectify plumbing system-related defects in residential buildings.

Details

Facilities , vol. 41 no. 13/14
Type: Research Article
ISSN: 0263-2772

Keywords

Executive summary
Publication date: 23 February 2024

CHINA: I-Soon data leaks embarrass Beijing

Details

DOI: 10.1108/OXAN-ES285453

ISSN: 2633-304X

Keywords

Geographic
Topical
Book part
Publication date: 25 July 2023

Iain Munro and Kate Kenny

Whistleblowing plays a crucial role in revealing organizational misconduct and systemic corruption in industry and government. This paper investigates changing practices of…

Abstract

Whistleblowing plays a crucial role in revealing organizational misconduct and systemic corruption in industry and government. This paper investigates changing practices of whistleblower activism, with particular reference to the role of solidarity and the increased role of support networks. Many modern whistleblower disclosures have revealed gaping flaws in the system of global governance related to a range of important social and economic issues, such as tax evasion, global mass surveillance, the use of torture and illegal wars of aggression. All these forms of systemic corruption are reliant on the use of secrecy havens to conceal the abuse from public scrutiny and democratic oversight. Counter-hegemonic social movements that oppose forms of systemic corruption can find important allies in those whistleblowers, who leak vital information about misconduct and corruption to the public. In this paper, we argue that there is a clear relationship of mutual support between whistleblowing and activist social movements, both in the process of whistleblowing and in furthering the campaigns of the social movements themselves. We theorize this, unpacking the processes and dynamics underlying the relationship, and offering a framework for analysis. The paper concludes with a discussion of the changing role of whistleblower activism and support networks in undertaking social reform and counter-hegemonic practice.

Details

Organizational Wrongdoing as the “Foundational” Grand Challenge: Consequences and Impact
Type: Book
ISBN: 978-1-83753-282-7

Keywords

Article
Publication date: 18 October 2023

Langdon Holmes, Scott Crossley, Harshvardhan Sikka and Wesley Morris

This study aims to report on an automatic deidentification system for labeling and obfuscating personally identifiable information (PII) in student-generated text.

Abstract

Purpose

This study aims to report on an automatic deidentification system for labeling and obfuscating personally identifiable information (PII) in student-generated text.

Design/methodology/approach

The authors evaluate the performance of their deidentification system on two data sets of student-generated text. Each data set was human-annotated for PII. The authors evaluate using two approaches: per-token PII classification accuracy and a simulated reidentification attack design. In the reidentification attack, two reviewers attempted to recover student identities from the data after PII was obfuscated by the authors’ system. In both cases, results are reported in terms of recall and precision.

Findings

The authors’ deidentification system recalled 84% of student name tokens in their first data set (96% of full names). On the second data set, it achieved a recall of 74% for student name tokens (91% of full names) and 75% for all direct identifiers. After the second data set was obfuscated by the authors’ system, two reviewers attempted to recover the identities of students from the obfuscated data. They performed below chance, indicating that the obfuscated data presents a low identity disclosure risk.

Research limitations/implications

The two data sets used in this study are not representative of all forms of student-generated text, so further work is needed to evaluate performance on more data.

Practical implications

This paper presents an open-source and automatic deidentification system appropriate for student-generated text with technical explanations and evaluations of performance.

Originality/value

Previous study on text deidentification has shown success in the medical domain. This paper develops on these approaches and applies them to text in the educational domain.

Details

Information and Learning Sciences, vol. 124 no. 9/10
Type: Research Article
ISSN: 2398-5348

Keywords

Article
Publication date: 6 April 2023

Jean Hatton

This paper discusses how professionally qualified cisgender lesbian, gay, bisexual or queer (LGBQ) women youth workers present their self. The research examined how youth workers…

Abstract

Purpose

This paper discusses how professionally qualified cisgender lesbian, gay, bisexual or queer (LGBQ) women youth workers present their self. The research examined how youth workers consciously or unconsciously shared their sexual identity with young people with whom they worked. Whilst this research focussed on youth workers, issues discussed are relevant for practitioners from a range of professional backgrounds such as therapists, social workers, teachers and health care practitioners. The research focused only on the experiences of cisgender LGBQ women as the experiences of men and trans women are different and so requires separate research.

Design/methodology/approach

This research taking a qualitative approach, used in-depth interviews to discuss how respondents shared information about their identity.

Findings

Some of fifteen youth workers interviewed reported not having choices about being out with the young people as their sexuality had been leaked. Others were able to pass and so choose when, or if, to be out with young people. Their different strategies to sharing information regarding their sexuality used by these participants reflected different approaches to being out.

Originality/value

Although there is evidence in the literature of how being out or closeted impacts on teachers there is little written about the effect on youth workers or other professionals. The little research that has been undertaken in this area focusses on the impact of identity on the clients rather than on the professionals. This article contributes to filling this gap in the literature.

Details

Equality, Diversity and Inclusion: An International Journal, vol. 42 no. 8
Type: Research Article
ISSN: 2040-7149

Keywords

Case study
Publication date: 1 April 2024

Christopher E. Weilage and Patricia Kraft

This case was developed from a primary source and is based on interviews and personal evaluations.

Abstract

Research methodology

This case was developed from a primary source and is based on interviews and personal evaluations.

Case overview/synopsis

Maria was at a scheduled lunch with her direct manager, John, who inquired about the privacy leak regarding employee data she had found a few months earlier. Upon discovering the issue, Maria took on the task of ensuring the privacy leak was dealt with and resolved. John knew it was a challenging interdepartmental task because other managers did not immediately recognize the seriousness and full impact of the issue on employee privacy. Plus, the belief was that the project to combine two software programs improving CRM functionality, causing the employee data leak, needed immediate release. During the lunch, Maria stated that the privacy problem was fully eliminated and that, in the end, it did impact a lot more than only a few employees. John actively encouraged Maria in the conversation to seek feedback from Richard, the managing director directly involved and responsible for the project, which Maria had already done. When the feedback arrived, Maria felt extremely hurt by the comments and began to question the validity of the company’s values. Now, she must decide what her options are.

This case study is about dealing with feedback, career development and how to receive and provide feedback. It presents a situation that allows for a variety of ways to address negative feedback and shows that different reactions can have broader consequences for career development. At the same time, the case illustrates how feedback is given in international teams and companies, and how intercultural or gender-relevant circumstances may have to be considered.

Complexity academic level

This case study was written for use in BA and MA classes to promote discussion regarding feedback. Relevant courses in business and administration or an international business study program could be organizational behavior, communication training, conflict management, an intercultural competencies course or in line with career management sequences.

Early program BA students, BA students in advanced semesters as well as MA students with work experience are all markets for the case. It has been class-tested with BA international business students. While advanced BA and graduate students are able to and expected to enrich discussions by contributing personal stories, early program BA students benefit from learning how to create feedback and how to read feedback – including from other students, instructors and managers, to use during their first internships.

Details

The CASE Journal, vol. ahead-of-print no. ahead-of-print
Type: Case Study
ISSN: 1544-9106

Keywords

Executive summary
Publication date: 4 March 2024

GERMANY: Audio leak to complicate missile decision

Details

DOI: 10.1108/OXAN-ES285645

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 13 September 2023

Omid Alijani Mamaghani and Mohammad Zolfaghari

Gas transmission pipelines are at constant risk of gas leakage or fire due to various atmospheric environments, corrosion on pipe metal surfaces and other external factors. This…

Abstract

Purpose

Gas transmission pipelines are at constant risk of gas leakage or fire due to various atmospheric environments, corrosion on pipe metal surfaces and other external factors. This study aims to reduce the human and financial risks associated with gas transmission by regularly monitoring pipeline performance, controlling situations and preventing disasters.

Design/methodology/approach

Facility managers can monitor the status of gas transmission lines in real-time by integrating sensor information into a building information modeling (BIM) 3D model. Using the Monitoring Panel plugin, coded in C# programming language and operated through Navisworks software, the model provides up-to-date information on pipeline safety and performance.

Findings

By collecting project information on the BIM and installing critical sensors, this approach allows facility manager to observe the real-time safety status of gas pipelines. If any risks of gas leakage or accidents are identified by the sensors, the BIM model quickly shows the location of the incident, enabling facility managers to make the best decisions to reduce financial and life risks. This intelligent gas transmission pipeline approach changes traditional risk management and inspection methods, minimizing the risk of explosion and gas leakage in the environment.

Originality/value

This research distinguishes itself from related work by integrating sensor data into a BIM model for real-time monitoring and providing facility managers with up-to-date safety information. By leveraging intelligent gas transmission pipelines, the system enables quick identification and location of potential hazards, reducing financial and human risks associated with gas transmission.

Details

Journal of Facilities Management , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1472-5967

Keywords

1 – 10 of 740