Search results

1 – 10 of 64
Open Access
Article
Publication date: 31 July 2023

Christiaan Ernst (Riaan) Heyman

This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing…

1723

Abstract

Purpose

This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing material for Mirror Trading International (MTI). The red flag checklist test seeks to establish if MTI’s marketing material posted on YouTube® (in the form of a live video presentation) exhibits any of the red flags from the checklist.

Design/methodology/approach

The study uses a structured literature review and qualitative analysis of red flags for Ponzi and cryptocurrency Ponzi schemes.

Findings

A research lacuna was discovered with regard to cryptocurrency Ponzi scheme red flags. By means of a structured literature review, journal papers were identified that listed and discussed Ponzi scheme red flags. The red flags from the identified journal papers were subsequently used in a qualitative analysis. The analyses and syntheses resulted in the development of a red flag checklist for cryptocurrency Ponzi schemes, with five red flag categories, containing 18 associated red flags. The red flag checklist was then tested against MTI’s marketing material (a transcription of a live YouTube presentation). The test resulted in MTI’s marketing material exhibiting 88% of the red flags contained within the checklist.

Research limitations/implications

The inherent limitations in the design of using a structured literature review and the lack of research regarding the cryptocurrency Ponzi scheme red flags.

Practical implications

The study provides a red flag checklist for cryptocurrency Ponzi schemes. The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.

Social implications

The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.

Originality/value

The study provides a red flag checklist for cryptocurrency Ponzi schemes.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 29 April 2024

Amanda Warburton-Wynn

This paper aims to introduce the concept of using the well-established Shared Lives approach to support survivors of domestic abuse with complex needs including those with…

Abstract

Purpose

This paper aims to introduce the concept of using the well-established Shared Lives approach to support survivors of domestic abuse with complex needs including those with learning and physical disabilities, older people and carers.

Design/methodology/approach

Survivors with complex needs are often excluded from traditional domestic abuse support services thus increasing their risk and making recovery impossible. Using the Shared Lives approach in suitable cases could address gaps in provision and improve the outcomes for survivors with disabilities, older survivors and carers.

Findings

The paper draws on evidence from reports and research about the experiences of these cohorts of survivors to explain how the Shared Lives approach could increase support options for specific categories of survivors.

Practical implications

Using the Shared Lives approach to support cohorts of victims/survivors who experience barriers to accessing support could improve outcomes for these people, reduce risk of serious harm and improve quality of life.

Originality/value

With the recent recommendation from Association of Directors of Adult Social Services around increasing use of Shared Lives, this paper provides one potential way to meet this recommendation.

Details

The Journal of Adult Protection, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1466-8203

Keywords

Abstract

Details

Police Responses to Islamist Violent Extremism and Terrorism
Type: Book
ISBN: 978-1-83797-845-8

Book part
Publication date: 2 May 2024

Amanuel Elias

Racism occurs in many ways and varies across countries, evolving and adapting to sociocultural history, as well as contemporary economic, political and technological changes. This…

Abstract

Racism occurs in many ways and varies across countries, evolving and adapting to sociocultural history, as well as contemporary economic, political and technological changes. This chapter discusses the multilevel dimensions of racism and its diverse manifestations across multiracial societies. It examines how different aspects of racism are mediated interpersonally, and embedded in institutions, social structures and processes, that produce and sustain racial inequities in power, resources and lived experiences. Furthermore, this chapter explores the direct and indirect ways racism is expressed in online and offline platforms and details its impacts on various groups based on their intersecting social and cultural identities. Targets of racism are those who primarily bear the adverse effects. However, racism also affects its perpetrators in many ways, including by limiting their social relations and attachments, and by imposing social and economic costs. This chapter thus analyses the many aspects of racism both from targets and perpetrators' perspectives.

Details

Racism and Anti-Racism Today
Type: Book
ISBN: 978-1-83753-512-5

Keywords

Abstract

Details

Police Responses to Islamist Violent Extremism and Terrorism
Type: Book
ISBN: 978-1-83797-845-8

Article
Publication date: 18 April 2024

Elizabeth Hutton, Jason Skues and Lisa Wise

This study aims to use the dual-continuum model of mental health to explore mental health in Australian construction apprentices from the perspective of key stakeholders in the…

Abstract

Purpose

This study aims to use the dual-continuum model of mental health to explore mental health in Australian construction apprentices from the perspective of key stakeholders in the apprenticeship model. In particular, this study explored how construction apprentices, Vocational Education and Training (VET) teachers, industry employers and mental health workers understood the construct of mental health, factors associated with the dimension of psychological distress/symptoms of mental illness, and factors associated with the dimension of mental wellbeing.

Design/methodology/approach

This study used an exploratory qualitative research design. Data from 36 semi-structured interviews were analysed using thematic analysis. Participants comprised 19 Australian construction apprentices, 5 VET teachers, 7 industry employers and 5 mental health workers.

Findings

In total, 14 themes were generated from the data set. Participants across stakeholder groups reported a limited understanding about mental health. Participants cited a range of negative personal, workplace and industry factors associated with psychological distress/symptoms of mental illness, but only reported a few factors associated with mental wellbeing.

Originality/value

To the best of the authors’ knowledge, this study is one of the first to use the dual-continuum model of mental health to explore the mental health of Australian construction apprentices, and to explore the factors associated with both dimensions of this model from the perspective of key stakeholders in the Australian construction apprenticeship model.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 7 April 2023

Arindam Bhattacharjee and Anita Sarkar

Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while…

Abstract

Purpose

Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while another suggests cyberloafing is a coping response to stressful work events. Our work contributes to the latter stream of literature. The key objective of our study is to examine whether cyberloafing could be a means to cope with a stressful work event-abusive supervision, and if yes, what mediating and boundary conditions are involved. For this investigation, the authors leveraged the Stressor-Emotion-CWB theory which posits that individuals engage in CWB to cope with the negative affect generated by the stressors and that this relationship is moderated at the first stage by personality traits.

Design/methodology/approach

Using a multi-wave survey design, the authors collected data from 357 employees working in an Indian IT firm. Results revealed support for three out of the four hypotheses.

Findings

Based on the Stressor-Emotion-CWB theory, the authors found that work-related negative affect fully mediated the positive relationship between abusive supervision and cyberloafing, and work locus of control (WLOC) moderated the positive relationship between abusive supervision and work-related negative affect. The authors did not find any evidence of a direct relationship between abusive supervision and cyberloafing. Also, the positive indirect relationship between abusive supervision and cyberloafing through work-related negative affect was moderated at the first stage by the WLOC such that the indirect effect was stronger (weaker) at high (low) levels of WLOC.

Originality/value

This work demonstrates that cyberloafing could be a way for employees to cope with their abusive supervisors.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 24 October 2023

Doron Goldbarsht

The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks…

Abstract

Purpose

The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks that protect consumers, combat money laundering and address risks linked to digital assets. Conventional approaches to confiscation and anti-money laundering are deemed insufficient in this evolving landscape. The absence of a central authority and the use of encryption hinder the identification of asset owners and the tracking of illicit activities. Moreover, the international and cross-border nature of digital assets complicates matters, demanding global coordination. The purpose of this study is to highlight that the effective combat of money laundering, legislative action, innovative investigative techniques and public–private partnerships are crucial.

Design/methodology/approach

The focal point of this paper is Australia’s approach to law enforcement in the realm of digital assets. It underscores the pivotal role of robust confiscation mechanisms in disrupting criminal networks operating through digital means. The paper firmly asserts that staying ahead of the curve and maintaining an agile stance is paramount. Criminals are quick to embrace emerging technologies, necessitating proactive measures from policymakers and law enforcement agencies.

Findings

It is argued that an agile and comprehensive approach is vital in countering money laundering, as criminals adapt to new technologies. Policymakers and law enforcement agencies must remain proactively ahead of these developments to efficiently identify, trace and seize digital assets involved in illicit activities, thereby safeguarding the integrity of the global financial system.

Originality/value

This paper provides a distinctive perspective by examining Australia’s legal anti-money laundering and counterterrorism financing framework, along with its law enforcement strategies within the realm of the digital asset landscape. While there is a plethora of literature on both asset confiscation and digital assets, there is a noticeable absence of exploration into their interplay, especially within the Australian context.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 8 August 2023

Wahyu Fahrul Ridho

The purpose of this study is to critically examine a prevalent online scam mechanism, with the aim of understanding its exploitation of behavioral finance principles and group…

Abstract

Purpose

The purpose of this study is to critically examine a prevalent online scam mechanism, with the aim of understanding its exploitation of behavioral finance principles and group dynamics and propose effective countermeasures.

Design/methodology/approach

This study uses a blend of case study and thematic analysis, drawing from behavioral finance, social psychology and criminology, using primary source testimonies of victims to provide a detailed exploration of the scam’s operations.

Findings

This research uncovers the strategic use of four key principles: loss aversion, overconfidence, scarcity bias and social proof, within the scam operation. These tendencies are manipulated to induce victims to progressively invest into the fraudulent scheme, even amid growing suspicions.

Research limitations/implications

While the research elucidates on the workings of one specific online scam, it is necessary to explore if and how these principles are used in various other online fraudulent schemes, to develop comprehensive countermeasures.

Practical implications

The findings underscore the urgent need for enhanced public awareness, stronger corporate responsibility and robust regulatory oversight. There is a call for concerted efforts encompassing public education campaigns, fortified security protocols and strong legal frameworks for preventing such scams.

Social implications

The research emphasizes the need for collective action in ensuring a safe online space. This involves the individual user’s prudence, businesses’ proactive education initiatives and stringent legal actions against fraudulent activities.

Originality/value

This research offers novel insights into the nuanced manipulation of behavioral finance principles within online scams, based on empirical data from victim testimonials. These findings contribute to the understanding of the psychological mechanisms at play in online scams and are instrumental in formulating effective preventive strategies.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 20 July 2023

Godfred Matthew Yaw Owusu, Theodora Aba Abekah Koomson and George Nana Agyekum Donkor

This paper aims to review corporate fraud, as a concept, and the emerging research trends in corporate fraud research from 1957 to 2022 using bibliometric analysis techniques.

Abstract

Purpose

This paper aims to review corporate fraud, as a concept, and the emerging research trends in corporate fraud research from 1957 to 2022 using bibliometric analysis techniques.

Design/methodology/approach

A total of 7,750 publications from the Scopus database were first assessed using performance analysis to explore the descriptive nature of the bibliographic data, and subsequently, citation, co-citation, co-occurrence and bibliographic coupling analyses were conducted using the VOSviewer software.

Findings

The results indicate there has been increasing growth in fraud research over the years, especially since the global corporate scandals of 2008. Although fraud is a global issue, the results suggest that most extant studies originate from developed economies, with a high level of collaboration amongst scholars in these countries. In addition, the co-occurrence analysis indicates that research into corporate fraud has largely focused on its determinants and corruption. The determinants identified are further clustered in the paper as individual, organizational and national-level factors.

Practical implications

The findings should inform practitioners and policymakers of the state of knowledge on corporate fraud which could be useful in developing strategies and policies to mitigate its occurrence.

Social implications

The study points to the need for research collaborations among scholars in developing economies to increase investigations into the occurrences of fraud.

Originality/value

To the best of the authors’ knowledge, this is the first study to holistically assess the intellectual structure of corporate fraud studies from its inception and the trends over time.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of 64