Search results

1 – 10 of 35
Open Access
Article
Publication date: 19 October 2023

Tinna Dögg Sigurdardóttir, Lee Rainbow, Adam Gregory, Pippa Gregory and Gisli Hannes Gudjonsson

The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).

2597

Abstract

Purpose

The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).

Design/methodology/approach

The 77 BIA reports reviewed were written between 2016 and 2021. They were evaluated using Toulmin’s (1958) strategy for structuring pertinent arguments, current compliance with professional standards, the grounds and backing provided for the claims made and the potential utility of the recommendations provided.

Findings

Consistent with previous research, most of the reports involved murder and sexual offences. The BIA reports met professional standards with extremely high frequency. The 77 reports contained a total of 1,308 claims of which 99% were based on stated grounds. A warrant and/or backing was provided for 73% of the claims. Most of the claims in the BIA reports involved a behavioural evaluation of the crime scene and offender characteristics. The potential utility of the reports was judged to be 95% for informative behavioural crime scene analysis and 40% for potential new lines of enquiry.

Practical implications

The reports should serve as a model for the work of behavioural investigative advisers internationally.

Originality/value

To the best of the authors’ knowledge, this is the first study to systematically evaluate BIA reports commissioned by the NCA; it adds to previous similar studies by evaluating the largest number of BIA reports ever reviewed, and uniquely provides judgement of overall utility.

Open Access
Article
Publication date: 28 March 2023

Avitus Agbor Agbor

Over a decade since the Special Criminal Court (SCC) was established in Cameroon, hundreds of individuals have been indicted, tried and convicted. Sentences have been imposed…

Abstract

Purpose

Over a decade since the Special Criminal Court (SCC) was established in Cameroon, hundreds of individuals have been indicted, tried and convicted. Sentences have been imposed, most of which include a term of imprisonment (principal punishment/penalty) and confiscation as accessory penalty or punishment. Research focus has not been directed at the sentences which, as argued in this paper, are inconsistent, incommensurate with the amounts of money stolen and a significant departure from the Penal Code. This paper aims to explore the aspect of sentencing by the SCC.

Design/methodology/approach

To identify, highlight and discuss the issue of sentencing, the paper looks at a blend of primary and secondary materials: primary materials here include but not limited to the judgements of the SCC and other courts in Cameroon and the Penal Code. Secondary materials shall include the works of scholars in the fields of criminal law, criminal justice and penal reform.

Findings

A few findings were made: first, the judges are inconsistent in the manner in which they determine the appropriate sentence. Second, in making that determination, the judges would have been oblivious to the prescripts in the Penal Code, which provides the term of imprisonment, and in the event of a mitigating circumstance, the prescribed minimum to be applied. Yet, the default imposition of an aggravating circumstance (being a civil servant) was not explored by the SCC. Finally, whether the sentences imposed are commensurate with the amounts of monies stolen.

Research limitations/implications

This research unravels key insights into the functioning of the SCC. It advances the knowledge thereon and adds to the literature on corruption in Cameroon.

Practical implications

The prosecution and judges at the SCC should deepen their knowledge of Cameroonian criminal law, especially on the nature of liberty given to judges to determine within the prescribed range of the sentence to be imposed but also consider the existence of an aggravating factor – civil servant. They must also consider whether the sentences imposed befit the crime for which they are convicted.

Originality/value

The paper is an original contribution with new insights on the manner in which sentencing should be approached by the SCC.

Open Access
Article
Publication date: 5 February 2024

Ariadna H. Ochnio

Recent developments in the EU’s anti-corruption strategy have brought the EU closer to meeting the UNCAC’s objectives, i.e. the Proposal for a Directive on combating corruption…

Abstract

Purpose

Recent developments in the EU’s anti-corruption strategy have brought the EU closer to meeting the UNCAC’s objectives, i.e. the Proposal for a Directive on combating corruption (2023) and the Proposal for a Directive on Asset Recovery and Confiscation (2022). This paper aims to discuss these developments from the perspective of the UNCAC, to identify missing elements in the EU’s asset recovery mechanisms.

Design/methodology/approach

Critical approach towards EU anti-corruption policy (discussing the problems and solutions). Review of EU developments in asset recovery law.

Findings

There is a political will on the part of the EU to fight corruption through the rules enshrined in the UNCAC. However, improving EU law by introducing a new type of confiscation of unexplained wealth and criminalising illicit enrichment, without establishing convergent rules for the return of corrupt assets from EU territory to the countries of origin, cannot be seen as sufficient action to achieve the UNCAC’s objectives. In modelling mechanisms of the return of assets, the EU should search for solutions to overcome the difficulties resulting from the ordre public clause remaining a significant factor conditioning mutual legal assistance.

Originality/value

This paper discusses the possible input of the EU, as a non-State Party to the UNCAC, to advance implementing the UNCAC solutions on asset recovery by establishing convergent rules for the return of corrupt assets from EU territory to countries of origin.

Details

Journal of Money Laundering Control, vol. 27 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7145

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 19 May 2023

Georgios Pavlidis

This paper aims to critically examine the European Union’s legislative initiative to establish an Anti-Money Laundering Authority (AMLA), which will introduce union-level…

4885

Abstract

Purpose

This paper aims to critically examine the European Union’s legislative initiative to establish an Anti-Money Laundering Authority (AMLA), which will introduce union-level supervision and provide support to national supervisors in the field of anti-money laundering and countering the financing of terrorism (AML/CFT), as well as to financial intelligence units (FIUs) in European Union (EU) member states. The paper discusses why this initiative was deemed necessary, which are the key objectives, rules and principles of AMLA and which challenges and opportunities will emerge as AMLA becomes operational.

Design/methodology/approach

This paper draws on reports, legislation, legal scholarship and other open-source data on the EU legislative initiative to establish a new AMLA.

Findings

AMLA will provide a comprehensive framework for EU-level AML/CFT supervision and for cooperation among FIUs. If all organisational challenges are properly addressed, the new authority will significantly enhance the EU’s ability to tackle money laundering and terrorism financing.

Originality/value

To the best of the author’s knowledge, this study is one of the first to examine the mission, governance and supervision mechanisms of the EU’s AMLA, as well as the challenges and opportunities associated with its functioning.

Open Access
Article
Publication date: 1 February 2023

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

4201

Abstract

Purpose

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

Design/methodology/approach

The study uses a qualitative approach involving the use of structured questionnaires. The questionnaires were made available to the staff of 17 licensed banks in South Africa who deal with management, operation, administration and banking services. Two hypotheses were formulated and non-parametric statistical analyses involving the use of Chi-square test, Fischer’s Exact test and Spearman’s correlation were carried out. The two hypotheses formulated were tested to draw a conclusion.

Findings

The results obtained indicate that the impact of cyberfraud in the South African banking industry is highly significant and has affected the reputation of some of the banks. This calls for the need to review the diverse ways of curbing cyberfraud to lessen their impact and that of associated fraud risks on the banking operation.

Practical implications

This study provides an analysis on the relationship cyberfraud occurrences and the reputation of South African banks. The implementation of the recommendations may reinforce the existing security measures in the fight against cyberfraud.

Originality/value

The novelty of this study lies in the fact that the assessment of the impact of cyberfraud on the banking industry in South Africa has not been sufficiently highlighted by the existing literature.

Details

Journal of Financial Crime, vol. 31 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 6 July 2023

Jacobus Gerhardus J. Nortje and Daniel Christoffel Myburgh

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of…

Abstract

Purpose

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of such a warrant in South African criminal cases.

Design/methodology/approach

This paper provides a brief overview of international and local impediments, followed by a detailed discussion of the implications of these impediments and how it is approached in various jurisdictions. The methodology of this paper consists of a literature review.

Findings

Addressing the impediments in the compilation of the application and the warrant will be beneficial for forensic investigators, the South African Police Service (SAPS) and the administration of justice in South Africa.

Research limitations/implications

Search and seizures for digital evidence form part of civil, regulatory and criminal search and seizures. This study focuses on the search and seizure of digital evidence in criminal matters pursuant to mainly the provisions of the Criminal Procedure Act 51 of 1977 and the Cybercrimes Act 19 of 2020.

Originality/value

The originality of this paper lies in the approach to the drafting of applications for search and seizure warrants for digital information in South Africa. The contribution of the study is that, by using this approach, the SAPS can address the impediments during the application and compilation of the warrants, which would enhance the quality of investigations and contribute to the successful investigation and prosecution of crime in South Africa.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Content available
Article
Publication date: 30 April 2024

Bridget Penhale and Ian Cummins

Abstract

Details

The Journal of Adult Protection, vol. 26 no. 1
Type: Research Article
ISSN: 1466-8203

Content available

Abstract

Details

Compliance and Financial Crime Risk in Banks
Type: Book
ISBN: 978-1-83549-042-6

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Access

Only content I have access to

Year

Last 3 months (35)

Content type

1 – 10 of 35