Search results

1 – 9 of 9
Content available
Article
Publication date: 3 July 2017

Shima D. Keene

607

Abstract

Details

Journal of Financial Crime, vol. 24 no. 3
Type: Research Article
ISSN: 1359-0790

Content available
Article
Publication date: 4 May 2012

Shima D. Keene

733

Abstract

Details

Journal of Money Laundering Control, vol. 15 no. 2
Type: Research Article
ISSN: 1368-5201

Article
Publication date: 11 October 2011

Shima D. Keene

The purpose of this paper is to highlight the extent of the use of the internet by terrorist organisations to achieve their strategic and operational objectives.

4235

Abstract

Purpose

The purpose of this paper is to highlight the extent of the use of the internet by terrorist organisations to achieve their strategic and operational objectives.

Design/methodology/approach

The methodology adopted consisted of an extensive literature review on topics to include Islamic terrorism, cyber crime, globalisation, and financial crime, supported by field work to verify findings.

Findings

Al‐Qaeda has become a radical Islamic phenomenon held together through its global network of communities, both virtual and physical. One significant enabler has been the internet, which enables anonymous communication, aids recruitment, encourages the sharing of knowledge, as well as playing a significant role in the spreading of propaganda. The understanding of the use of internet‐based technologies, not only as a potential target for terrorist attack, but as a tool to achieve its ideological and operational goals, remains a neglected area of study requiring further focus.

Originality/value

This paper serves as a useful guide to alert and educate counter‐terrorism professionals, law enforcement and policy makers of the significance of the extent of the use of the internet for purposes such as operational planning, recruitment, psychological operations and fund raising. It is essential that these subjects should not be viewed as a peripheral issue to cyber‐terrorism, but instead, should be considered to be central to the existing counter‐terrorism effort.

Details

Journal of Money Laundering Control, vol. 14 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 January 2012

Shima D. Keene

The purpose of this paper is to highlight emerging threats in cyberspace, with particular reference to financial crime in the virtual world, which have real life implications, as…

4350

Abstract

Purpose

The purpose of this paper is to highlight emerging threats in cyberspace, with particular reference to financial crime in the virtual world, which have real life implications, as well as to recommend ways in which the threat may be mitigated.

Design/methodology/approach

The methodology adopted consisted of an extensive literature review on topics to include cyber crime, virtual worlds, and financial crime.

Findings

Virtual worlds such as Second Life play a key role in supporting real world activities such as education, training and business and as such, should not be dismissed purely as a “gaming” environment. In addition, emerging technologies coupled with the lack of legislation and regulation within virtual worlds has created an environment where a variety of crimes can be committed without fear of detection or prosecution. A further concern is its use by criminals as a vehicle to mask real life crimes such as fraud, identify theft and money laundering. The question is to what extent the blurring of the virtual and real life environments can be clarified in order to minimise the risk of abuse of virtual environments by criminal elements, which have direct consequences in the real world.

Originality/value

This paper serves as a useful guide to alert and educate security professionals, the judiciary, law enforcement and policy makers of the significance and the extent of the use of “virtual” environments in cyberspace for criminal means, such as fraud and money laundering. Findings are supported by a conclusion which includes recommendations for tackling these issues.

Details

Journal of Money Laundering Control, vol. 15 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Content available
Article
Publication date: 1 January 2013

Barry Rider

236

Abstract

Details

Journal of Money Laundering Control, vol. 16 no. 1
Type: Research Article
ISSN: 1368-5201

Content available
Article
Publication date: 7 January 2014

Yoram Danziger

119

Abstract

Details

Journal of Money Laundering Control, vol. 17 no. 1
Type: Research Article
ISSN: 1368-5201

Article
Publication date: 1 June 2002

Barrie O. Pettman and Richard Dobbins

This issue is a selected bibliography covering the subject of leadership.

26824

Abstract

This issue is a selected bibliography covering the subject of leadership.

Details

Equal Opportunities International, vol. 21 no. 4/5/6
Type: Research Article
ISSN: 0261-0159

Keywords

Article
Publication date: 3 July 2017

Kenneth Murray

The purpose of this paper is to highlight the importance of improving financial intelligence capture in understanding organized crime and the funding of terrorism.

514

Abstract

Purpose

The purpose of this paper is to highlight the importance of improving financial intelligence capture in understanding organized crime and the funding of terrorism.

Design/methodology/approach

The paper presents an analytical review of the core business processes used to harvest the revenues from illegal drug trafficking. Furthermore, assessment of the extent to which modern, organised crime – and the dynamics of the relationships between the relevant collaborating parties – can be more accurately defined in terms of these processes.

Findings

Understanding distinctive capabilities of criminal funding processes as well as their participants offers an approach to filling intelligence black holes which continue to afflict efforts to tackle organised crime and terrorism.

Originality/value

This paper establishes a framework for understanding and countering threat through application of competitive strategy analysis.

Details

Journal of Financial Crime, vol. 24 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 12 March 2014

Richard Fleming and Shima Sum

The purpose of this paper is to assess the empirical support for the use of assistive technology in the care of people with dementia as an intervention to improve independence…

2362

Abstract

Purpose

The purpose of this paper is to assess the empirical support for the use of assistive technology in the care of people with dementia as an intervention to improve independence, safety, communication, wellbeing and carer support.

Design/methodology/approach

A total of 232 papers were identified as potentially relevant. Inclusion criteria were: studies published between 1995 and 2011, incorporated a control group, pre-test-post-test, cross sectional or survey design, type of interventions and types of participants. The 41 papers that met criteria were subjected to an assessment of their validity using the model provided by Forbes. Following the assessment seven papers were considered as strong, ten moderate and 24 weak. The review is presented around the following topics: independence, prompts and reminders; safety and security; leisure and lifestyle, communication and telehealth; and therapeutic interventions.

Findings

The literature exploring the use of assistive technologies for increasing independence and compensating for memory problems illustrate the problems of moving from the laboratory to real life. The studies are usually limited by very small samples, high drop-out rates, very basic statistical analyses and lack of adjustment for multiple comparisons and poor performance of the technology itself.

Originality/value

Research to date has been unable to establish a positive difference to the lives of people with dementia by the general use of the assistive technology reviewed here.

Details

Journal of Assistive Technologies, vol. 8 no. 1
Type: Research Article
ISSN: 1754-9450

Keywords

1 – 9 of 9