Search results

1 – 10 of 261
Open Access
Article
Publication date: 31 July 2023

Christiaan Ernst (Riaan) Heyman

This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing…

1565

Abstract

Purpose

This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing material for Mirror Trading International (MTI). The red flag checklist test seeks to establish if MTI’s marketing material posted on YouTube® (in the form of a live video presentation) exhibits any of the red flags from the checklist.

Design/methodology/approach

The study uses a structured literature review and qualitative analysis of red flags for Ponzi and cryptocurrency Ponzi schemes.

Findings

A research lacuna was discovered with regard to cryptocurrency Ponzi scheme red flags. By means of a structured literature review, journal papers were identified that listed and discussed Ponzi scheme red flags. The red flags from the identified journal papers were subsequently used in a qualitative analysis. The analyses and syntheses resulted in the development of a red flag checklist for cryptocurrency Ponzi schemes, with five red flag categories, containing 18 associated red flags. The red flag checklist was then tested against MTI’s marketing material (a transcription of a live YouTube presentation). The test resulted in MTI’s marketing material exhibiting 88% of the red flags contained within the checklist.

Research limitations/implications

The inherent limitations in the design of using a structured literature review and the lack of research regarding the cryptocurrency Ponzi scheme red flags.

Practical implications

The study provides a red flag checklist for cryptocurrency Ponzi schemes. The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.

Social implications

The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.

Originality/value

The study provides a red flag checklist for cryptocurrency Ponzi schemes.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 May 2018

Iskandar Muda and Nurlina

Purpose – The purpose of this research is to know the influence of manufacture of textiles, clothing, and leather and manufacture of paper, printing, and publishing on economic…

Abstract

Purpose – The purpose of this research is to know the influence of manufacture of textiles, clothing, and leather and manufacture of paper, printing, and publishing on economic growth.

Design/Methodology/Approach – The method of research used was a causal research design in North Sumatera Province. The data used are secondary data sourced from Statistics Agency of North Sumatera Province. The method of analysis used in this research is SEM method using software Smart PLS.

Findings – The results show that manufacture of textiles, clothing, and leather and manufacture of paper, printing, and publishing influence to the economic growth.

Research Limitations/Implications – Limitations of the study included not analyzing by data pooling, and samples were restricted only to North Sumatra Province. The implication of this research is that the variables of manufacture of textiles, clothing, and leather give a significant contribution to the economic growth of North Sumatra. To this end, that need to be made some policies shoul be implemented to facilitate manufacture of textiles, clothing, and leather others invest in the district and city in North Sumatra.

Originality/Value – The originality of this study attempts to examine export indicators in certain segments where other studies do not examine them.

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 20 July 2022

Errolyn Gordon and Gloria Sauti

The purpose of the study was to provide a comparative analysis on the psychological and socio-cultural impacts of COVID-19 on victims of intimate partner violence (IPV) in South…

1199

Abstract

Purpose

The purpose of the study was to provide a comparative analysis on the psychological and socio-cultural impacts of COVID-19 on victims of intimate partner violence (IPV) in South Africa (SA) and the USA.

Design/methodology/approach

The authors collected media and scholarly articles that dealt with IPV victims during the early phase of the pandemic. This study focused solely on SA and the USA because of their unique contexts and the fact that the authors are residents of these countries. The authors observed how both presidents dealt with IPV amidst the COVID 19 pandemic, especially when stay-at-home orders were in place. Aspects relating to the psychological and socio-cultural impacts amidst the pandemic were considered.

Findings

The authors found that in both countries, many black women from low socio-economic backgrounds experience IPV. Being in isolated spaces with their perpetrators prohibits victims from reporting the abuse. As the world attempts to curb the spread of COVID-19 infections, effective strategies have been suggested for victims and perpetrators. The authors found the approaches of the two governments (until the Biden Administration in 2021) to be starkly different in terms of effective strategies and the neglect and downplaying of the extent of one or both pandemics (i.e. COVID-19 and IPV). Pro-safety, equality, gender and race-conscious embracing approaches to overcome IPV are urgently needed.

Originality/value

The paper focused on IPV during the early phase of the COVID-19 pandemic. It provides relevant information about IPV in both countries, especially when stay-at-home orders are in place.

Details

The Journal of Adult Protection, vol. 24 no. 3/4
Type: Research Article
ISSN: 1466-8203

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Article
Publication date: 4 February 2022

Evelien Spelten, Julia van Vuuren, Peter O’Meara, Brodie Thomas, Mathieu Grenier, Richard Ferron, Jennie Helmer and Gina Agarwal

This study aims to investigate whether emergency health-care workers distinguish between different categories of perpetrators of violence and how they respond to different types…

Abstract

Purpose

This study aims to investigate whether emergency health-care workers distinguish between different categories of perpetrators of violence and how they respond to different types of perpetrator profiles.

Design/methodology/approach

Five focus groups with emergency health-care workers were held in Canada. The participants were asked whether they identified different groups of perpetrators of violence and how that impacted their approach. The focus group responses were transcribed verbatim and analysed thematically using a phenomenological approach.

Findings

Participants consistently identified five groups of perpetrators and tailored their approach on their assessment of the type of perpetrator involved. The five categories are: violence or aggressive behaviour from family members or bystander and violence related to; underlying mental health/illness issues; underlying physical health issues; addiction and substance use; and repeat visitors/offenders. Violence with an underlying (mental) health cause was handled professionally and compassionately by the health-care workers, while less patience and understanding was afforded in those instances where violence was associated with (recreational) alcohol or illicit substance use.

Originality/value

Emergency health-care workers can consistently distinguish between types of perpetrators of violence and aggression, which they then use as one factor in the clinical and situational assessments that inform their overall approach to the management incidents. This conclusion supports the need to move the focus away from the worker to the perpetrator and to an organisational rather than individual approach to help minimise violence against emergency health-care workers.

Details

Journal of Aggression, Conflict and Peace Research, vol. 14 no. 2
Type: Research Article
ISSN: 1759-6599

Keywords

Open Access
Article
Publication date: 16 November 2021

Tomas Jungert and Kristoffer Holm

Using observational and experimental designs, the purpose of this study was to explore if the power relation between the offender and the victim of incivility and the level of…

2288

Abstract

Purpose

Using observational and experimental designs, the purpose of this study was to explore if the power relation between the offender and the victim of incivility and the level of perceived severity of the incivility were associated with bystanders’ intentions to help when witnessing workplace incivility.

Design/methodology/approach

In Study 1, 160 participants completed a questionnaire where they described a recent uncivil incident they had witnessed, and completed measures of perceived severity and measures of their behavioural response as bystanders. In Study 2, 183 participants were randomised to read one of two vignettes (a manager being uncivil towards a subordinate or vice versa), and completed measures of perceived severity and of their motivation to intervene. The authors investigated whether the power relation between perpetrator and victim, and the perceived severity of the uncivil exchange, were associated with prosocial bystander behaviours in Study 1 and with motivation to defend the victim of incivility in Study 2.

Findings

Higher perpetrator power was significantly associated with the incident being perceived as more severe, and higher perpetrator power was directly related to greater tendency to confront, and lower tendency to avoid, the perpetrator. Perpetrator power was indirectly associated with social support according to the perceived severity. A supervisor acting in an uncivil manner was rated as more severe than a subordinate acting in such a way. Perceived severity mediated the relationship between perpetrator power and the witness’s introjected, identified and intrinsic motivation to intervene.

Originality/value

This study extends previous work by investigating how the perpetrator’s power influences both the bystander’s prosocial behaviour and their motivation to defend the victim. Furthermore, previous research has not considered how perceptions of severity might mediate the relationship between power, behaviour and motivation.

Details

International Journal of Conflict Management, vol. 33 no. 2
Type: Research Article
ISSN: 1044-4068

Keywords

Open Access

Abstract

Details

Online Anti-Rape Activism: Exploring the Politics of the Personal in the Age of Digital Media
Type: Book
ISBN: 978-1-83867-442-7

Open Access
Book part
Publication date: 4 June 2021

Laura Vitis

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online…

Abstract

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online sexual harassment, contact-based harassment, image-based abuse, and gender-based cyberhate – among others – as key manifestations of TFVW. It has also unpacked the legal strategies available to women seeking formal justice outcomes. However, much of the existing empirical scholarship has been produced within countries like the United States, United Kingdom, and Australia, and there has been limited research on this phenomenon within South East Asia. As such, this chapter maps how technology is shaping Singaporean women's experiences of gendered, sexual, and domestic violence. To do so, it draws upon findings from a research project which examined TFVW in Singapore by utilizing semistructured interviews with frontline workers in the fields of domestic and sexual violence and LGBT services. Drawing from Dragiewicz et al.’s (2018) work on technology-facilitated coercive control (TFCC), I argue that victims-survivors of dating, domestic, and family violence need to be provided with support that is TFCC informed and technically guided. I also suggest that further research is needed to fully understand the prevalence and nature of TFVW in the Singaporean context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 261