Search results
1 – 10 of 740This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It…
Abstract
Purpose
This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It explores the ethical and professional considerations of investigative journalists, how they approach privacy and information-sharing and how this differs from intelligence practice in government and industry. The paper assesses the strengths and limitations of Collaborative Investigative Reporting based on Information Leaks (CIRIL) as a kind of public-facing intelligence practice.
Design/methodology/approach
This study draws on academic literature, source material from investigations by the International Consortium of Investigative Journalists and the Organised Crime and Corruption Reporting Project, and a survey of financial crime compliance professionals conducted in 2022.
Findings
The paper identifies three key causal factors that have enabled the rise of CIRIL even as traditional journalism has declined: the digital storage of information; increasing public interest in offshore finance and tax evasion; and “virtual newsrooms” enabled by internet communications. It concludes that the primary strength of CIRIL is its creation of complex global narratives to inform the public about corruption and tax evasion, while its key weakness is that the scale and breadth of the data released makes it difficult to focus on likely criminal activity. Results of a survey of industry and government professionals indicate that CIRIL is generally more effective as public information than as an investigative resource, owing to the volume, age and quality of information released. However, the trends enabling CIRIL are likely to continue, and this means that governments and financial institutions need to become more effective at using leaked information.
Originality/value
Over the past decade, large-scale, data-driven investigative journalism projects such as the Pandora Papers and the Russian Laundromat have had a significant public impact by exposing money laundering, financial crime and corruption. These projects share certain hallmarks: the use of human intelligence, often sourced from anonymous leaks; inventive fusion of this intelligence with data from open sources; and collaboration among a global collective of investigative journalists to build a narrative. These projects prioritise informing the public. They are also an important information source for government and private sector organisations working to investigate and disrupt financial crime.
Details
Keywords
This leak included corporate documents and internal communications, and detailed a suite of spyware applications developed by Shanghai-based cybersecurity company I-Soon, a…
Details
DOI: 10.1108/OXAN-DB285558
ISSN: 2633-304X
Keywords
Geographic
Topical
Argaw Gurmu and Pabasara Wijeratne Mudiyanselage
Most residential building owners often report problems associated with the plumbing systems. If identified at the early stages, plumbing-related defects can be easily repaired…
Abstract
Purpose
Most residential building owners often report problems associated with the plumbing systems. If identified at the early stages, plumbing-related defects can be easily repaired. However, if unnoticed for a long period of time, they could lead to major damages and incur a significant cost to repair. Despite the problems, studies investigating plumbing anomalies and their root causes in residential buildings are limited. This study aims to explore plumbing defects and their potential causes, diagnosis methods and repair techniques in residential buildings.
Design/methodology/approach
This research used data collected through an extensive survey of both academic and grey literature. Through the content analysis, plumbing defects and the associated causes have been identified and presented in tabular format.
Findings
The study investigated the anomalies and causes in the residential plumbing system under five key sub-systems: water supply system; sanitary plumbing system; roof drainage system; heating, ventilation, air conditioning and gas system; and swimming pool. Accordingly, some of the identified plumbing defects include leakages, corrosion, water penetration, slow drainage and cracks. Damaged pipes, faulty equipment and installations are some of the common causes of the anomalies. Visual inspection, hydrostatic pressure test, thermography, high-tech pipe cameras, infrared cameras, leak noise correlators and leak loggers are techniques used for diagnosing anomalies. Reactive, preventive, predictive and reliability-centred maintenance strategies are identified to control or prevent anomalies.
Originality/value
The findings of this research can be used as a useful tool or guideline for contractors, plumbers, facilities managers and building surveyors to identify and rectify plumbing system-related defects in residential buildings.
Details
Keywords
CHINA: I-Soon data leaks embarrass Beijing
Details
DOI: 10.1108/OXAN-ES285453
ISSN: 2633-304X
Keywords
Geographic
Topical
Iain Munro and Kate Kenny
Whistleblowing plays a crucial role in revealing organizational misconduct and systemic corruption in industry and government. This paper investigates changing practices of…
Abstract
Whistleblowing plays a crucial role in revealing organizational misconduct and systemic corruption in industry and government. This paper investigates changing practices of whistleblower activism, with particular reference to the role of solidarity and the increased role of support networks. Many modern whistleblower disclosures have revealed gaping flaws in the system of global governance related to a range of important social and economic issues, such as tax evasion, global mass surveillance, the use of torture and illegal wars of aggression. All these forms of systemic corruption are reliant on the use of secrecy havens to conceal the abuse from public scrutiny and democratic oversight. Counter-hegemonic social movements that oppose forms of systemic corruption can find important allies in those whistleblowers, who leak vital information about misconduct and corruption to the public. In this paper, we argue that there is a clear relationship of mutual support between whistleblowing and activist social movements, both in the process of whistleblowing and in furthering the campaigns of the social movements themselves. We theorize this, unpacking the processes and dynamics underlying the relationship, and offering a framework for analysis. The paper concludes with a discussion of the changing role of whistleblower activism and support networks in undertaking social reform and counter-hegemonic practice.
Details
Keywords
Langdon Holmes, Scott Crossley, Harshvardhan Sikka and Wesley Morris
This study aims to report on an automatic deidentification system for labeling and obfuscating personally identifiable information (PII) in student-generated text.
Abstract
Purpose
This study aims to report on an automatic deidentification system for labeling and obfuscating personally identifiable information (PII) in student-generated text.
Design/methodology/approach
The authors evaluate the performance of their deidentification system on two data sets of student-generated text. Each data set was human-annotated for PII. The authors evaluate using two approaches: per-token PII classification accuracy and a simulated reidentification attack design. In the reidentification attack, two reviewers attempted to recover student identities from the data after PII was obfuscated by the authors’ system. In both cases, results are reported in terms of recall and precision.
Findings
The authors’ deidentification system recalled 84% of student name tokens in their first data set (96% of full names). On the second data set, it achieved a recall of 74% for student name tokens (91% of full names) and 75% for all direct identifiers. After the second data set was obfuscated by the authors’ system, two reviewers attempted to recover the identities of students from the obfuscated data. They performed below chance, indicating that the obfuscated data presents a low identity disclosure risk.
Research limitations/implications
The two data sets used in this study are not representative of all forms of student-generated text, so further work is needed to evaluate performance on more data.
Practical implications
This paper presents an open-source and automatic deidentification system appropriate for student-generated text with technical explanations and evaluations of performance.
Originality/value
Previous study on text deidentification has shown success in the medical domain. This paper develops on these approaches and applies them to text in the educational domain.
Details
Keywords
This paper discusses how professionally qualified cisgender lesbian, gay, bisexual or queer (LGBQ) women youth workers present their self. The research examined how youth workers…
Abstract
Purpose
This paper discusses how professionally qualified cisgender lesbian, gay, bisexual or queer (LGBQ) women youth workers present their self. The research examined how youth workers consciously or unconsciously shared their sexual identity with young people with whom they worked. Whilst this research focussed on youth workers, issues discussed are relevant for practitioners from a range of professional backgrounds such as therapists, social workers, teachers and health care practitioners. The research focused only on the experiences of cisgender LGBQ women as the experiences of men and trans women are different and so requires separate research.
Design/methodology/approach
This research taking a qualitative approach, used in-depth interviews to discuss how respondents shared information about their identity.
Findings
Some of fifteen youth workers interviewed reported not having choices about being out with the young people as their sexuality had been leaked. Others were able to pass and so choose when, or if, to be out with young people. Their different strategies to sharing information regarding their sexuality used by these participants reflected different approaches to being out.
Originality/value
Although there is evidence in the literature of how being out or closeted impacts on teachers there is little written about the effect on youth workers or other professionals. The little research that has been undertaken in this area focusses on the impact of identity on the clients rather than on the professionals. This article contributes to filling this gap in the literature.
Details
Keywords
Christopher E. Weilage and Patricia Kraft
This case was developed from a primary source and is based on interviews and personal evaluations.
Abstract
Research methodology
This case was developed from a primary source and is based on interviews and personal evaluations.
Case overview/synopsis
Maria was at a scheduled lunch with her direct manager, John, who inquired about the privacy leak regarding employee data she had found a few months earlier. Upon discovering the issue, Maria took on the task of ensuring the privacy leak was dealt with and resolved. John knew it was a challenging interdepartmental task because other managers did not immediately recognize the seriousness and full impact of the issue on employee privacy. Plus, the belief was that the project to combine two software programs improving CRM functionality, causing the employee data leak, needed immediate release. During the lunch, Maria stated that the privacy problem was fully eliminated and that, in the end, it did impact a lot more than only a few employees. John actively encouraged Maria in the conversation to seek feedback from Richard, the managing director directly involved and responsible for the project, which Maria had already done. When the feedback arrived, Maria felt extremely hurt by the comments and began to question the validity of the company’s values. Now, she must decide what her options are.
This case study is about dealing with feedback, career development and how to receive and provide feedback. It presents a situation that allows for a variety of ways to address negative feedback and shows that different reactions can have broader consequences for career development. At the same time, the case illustrates how feedback is given in international teams and companies, and how intercultural or gender-relevant circumstances may have to be considered.
Complexity academic level
This case study was written for use in BA and MA classes to promote discussion regarding feedback. Relevant courses in business and administration or an international business study program could be organizational behavior, communication training, conflict management, an intercultural competencies course or in line with career management sequences.
Early program BA students, BA students in advanced semesters as well as MA students with work experience are all markets for the case. It has been class-tested with BA international business students. While advanced BA and graduate students are able to and expected to enrich discussions by contributing personal stories, early program BA students benefit from learning how to create feedback and how to read feedback – including from other students, instructors and managers, to use during their first internships.
Details
Keywords
GERMANY: Audio leak to complicate missile decision
Details
DOI: 10.1108/OXAN-ES285645
ISSN: 2633-304X
Keywords
Geographic
Topical
Omid Alijani Mamaghani and Mohammad Zolfaghari
Gas transmission pipelines are at constant risk of gas leakage or fire due to various atmospheric environments, corrosion on pipe metal surfaces and other external factors. This…
Abstract
Purpose
Gas transmission pipelines are at constant risk of gas leakage or fire due to various atmospheric environments, corrosion on pipe metal surfaces and other external factors. This study aims to reduce the human and financial risks associated with gas transmission by regularly monitoring pipeline performance, controlling situations and preventing disasters.
Design/methodology/approach
Facility managers can monitor the status of gas transmission lines in real-time by integrating sensor information into a building information modeling (BIM) 3D model. Using the Monitoring Panel plugin, coded in C# programming language and operated through Navisworks software, the model provides up-to-date information on pipeline safety and performance.
Findings
By collecting project information on the BIM and installing critical sensors, this approach allows facility manager to observe the real-time safety status of gas pipelines. If any risks of gas leakage or accidents are identified by the sensors, the BIM model quickly shows the location of the incident, enabling facility managers to make the best decisions to reduce financial and life risks. This intelligent gas transmission pipeline approach changes traditional risk management and inspection methods, minimizing the risk of explosion and gas leakage in the environment.
Originality/value
This research distinguishes itself from related work by integrating sensor data into a BIM model for real-time monitoring and providing facility managers with up-to-date safety information. By leveraging intelligent gas transmission pipelines, the system enables quick identification and location of potential hazards, reducing financial and human risks associated with gas transmission.
Details