Search results

1 – 10 of 63
Article
Publication date: 1 January 2024

Keshnee Padayachee

This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale…

Abstract

Purpose

This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study. This paper aims to present the preliminary findings of an investigation that explored the constructs of personality traits and situational crime prevention theory (SCPT) as antecedents to social cognitive determinants (attitude, perceived behavioural control and subjective norms using the theory of planned behaviour [TPB] framing) and how these elements subsequently estimate compliant information security behaviour. Moreover, this paper delves into the contrasting influences of light and dark personality traits on insider information security compliance.

Design/methodology/approach

A cross-sectional survey was conducted to study SCPT measures and the personality factors dyad using a diverse but limited sample (n = 82).

Findings

There were ten significant direct relationships between SCPT factors and personality traits related to the components of the TPB. Seventeen hypotheses were not supported. However, these findings highlight the complexity of the topic under study.

Practical implications

Understanding individual differences within the compliance model could be used for custom training protocols, employee selection, assignment and specific types of information security interventions.

Originality/value

There is a scarcity of studies considering the effects of situational and personality factors, specifically the dark versus light triad of personality traits within the information security domain. Therefore, this preliminary result provides early insight that could guide further studies. This research could have important implications for organisations at risk of insider attacks.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 27 September 2023

Elvis Attakora-Amaniampong

There is a robust study on crime prevention through environmental design (CPTED) in student housing nowadays, but has a limited utilization of weight-of-evidence (W-o-E) approach…

Abstract

Purpose

There is a robust study on crime prevention through environmental design (CPTED) in student housing nowadays, but has a limited utilization of weight-of-evidence (W-o-E) approach. This study aims to assess the extent of CPTED in student housing facilities of universities in Ghana.

Design/methodology/approach

Using the on-campus student housing facilities of both private and public universities, the study adopted W-o-E approach that integrates two postoccupancy evaluations from end-users and student housing managers. In addition, observation by professionals as the lines of evidence (LoE) was also adopted. Weighted median was used to normalise the LoE into a W-o-E as the CPTED value in the student housing facilities.

Findings

The study uncovered low CPTED in the student housing facilities. Maintenance was identified as the leading CPTED principle present in the student housing facilities.

Practical implications

The study has given the extent of CPTED in students’ housing, an important insight for university students’ housing management. This can serve as a policy alert for the university students’ housing management to adopt building designs that enhance CPTED and the safety of the youth.

Originality/value

This study is different from other CPTED and students’ housing studies commonly situated in the Euro-America context. The study exceptionally applied the use of W-o-E in students’ housing in assessing the extent of CPTED in student housing within the context of sub-Saharan African universities.

Details

Safer Communities, vol. 23 no. 1
Type: Research Article
ISSN: 1757-8043

Keywords

Article
Publication date: 11 September 2023

Usman Adekunle Ojedokun, Olufikayo K. Oyelade, Adebimpe A. Adenugba and Olajide O. Akanji

Banditry is a major social problem in Nigeria that has over time defied series of intervention measures introduced by the federal and state governments to address it. Therefore…

Abstract

Purpose

Banditry is a major social problem in Nigeria that has over time defied series of intervention measures introduced by the federal and state governments to address it. Therefore, this study aims to investigate the counter-banditry strategies of the affected communities in Oyo State, Nigeria.

Design/methodology/approach

The research was exploratory and cross-sectional in design. Situational criminal prevention theory was used as conceptual guide. Data were elicited from community leaders, community members and local security guards using in-depth interview, key-informant interview and focus group discussion methods.

Findings

The results showed that communities affected by banditry problem were adopting different internal and external interventions to combat the criminal act. Although the counter-banditry strategies of the affected communities have brought about a reduction in the occurrence of the criminal act, the problem is yet to be totally eliminated as people still get victimised.

Originality/value

This research expanded the frontiers of knowledge by focusing on the counter-banditry strategies of the communities affected by the problem of banditry and also suggested relevant practical steps that can be taken to further strengthen the existing security architectures in such locations.

Details

Safer Communities, vol. 23 no. 1
Type: Research Article
ISSN: 1757-8043

Keywords

Article
Publication date: 5 January 2023

Mohd Irwan Abdul Rani, Sharifah Nazatul Faiza Syed Mustapha Nazri and Salwa Zolkaflil

This paper aims to provide a systematic literature review (SLR) on contemporary cardinal money mule issues.

Abstract

Purpose

This paper aims to provide a systematic literature review (SLR) on contemporary cardinal money mule issues.

Design/methodology/approach

This paper reviews the most common money mule themes in perpetrating financial crime activities, especially its roles, recruitment and awareness. A systematic review protocol called preferred reporting items for systematic review and meta-analysis protocols is adopted for this study.

Findings

Money mules are used by organized criminal groups (OCG) or fraudster to launder illicit funds from outrageous criminal activities. They allow their accounts to be used for money laundering by OCG. The attacker, OCG or fraudsters would layer the stolen funds using money mule accounts. These money mules are recruited using various approaches, oftentimes deceived by opulent lifestyles to captivate the interest of potential money mules.

Originality/value

This paper presents money mule awareness needed by accountant, bank employees and the society. It is an unprecedented SLR on money mule. This paper will be beneficial for future money mule researchers, enforcement agencies and practitioners in banking industry.

Details

Journal of Financial Crime, vol. 31 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 7 November 2023

Tim Prenzler, Nadine McKillop, Sue Rayment-McHugh and Lara Christensen

This paper aims to report on the results of a global search to identify the characteristics of successful sexual offender treatment programs, with a view to providing guidance for…

Abstract

Purpose

This paper aims to report on the results of a global search to identify the characteristics of successful sexual offender treatment programs, with a view to providing guidance for program development.

Design/methodology/approach

A keyword search was conducted of criminology and social science databases. Successful programs were selected on evaluations that used standard scientific designs.

Findings

This study identified 18 evaluations of 16 programs showing significant reductions in reconvictions. Most programs used cognitive behavioural therapy (CBT), with both group and individual sessions; and many evidenced multisystemic therapy (MST) approaches involving families and/or local communities. CBT-based approaches were also common in the 20 unsuccessful programs identified in the study, although fewer MST-oriented features were in evidence. Noncustodial settings, and combined custodial-noncustodial settings, were also more prominent in the successful programs.

Research limitations/implications

There is a shortage of studies focused on the specific components of successful treatment programs for sexual offenders, including for subsets of offenders, such as ethnic minority groups and women.

Practical implications

The findings demonstrate the need for more investment in treatment programs with strict evaluation processes. New and modified programs are likely to benefit from the application of CBT, MST and a community-based reintegration component. More research is needed on effective elements of sexual offender treatment programs.

Originality/value

To the best of the authors’ knowledge, this appears to be the first study that examines features of successful sexual offender treatment programs, compared to unsuccessful programs, using a case-study approach. The findings reinforce the known value of CBT and systemic approaches as core features of programs but raise important questions about what other components are key to activating success.

Details

Journal of Criminological Research, Policy and Practice, vol. 9 no. 3/4
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 29 November 2023

Hussain Syed Gowhor

This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up…

Abstract

Purpose

This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up with the criteria, which will make this tool an effective one in early detection of terrorist financing activities.

Design/methodology/approach

Considering the research aim, this research uses the funnelling method for identifying effectiveness criteria. Funnelling is a method of literature review that helps find pertinent literature by refining the search through filtering the available research (Ridley, 2008). Using this method, the researcher first applied the criteria of actionable intelligence to filter the financial intelligence tools to select the most promising and important tool (suspicious transaction reporting) for early detection of terrorist financing activities. The funnelling method was also applied to derive the effectiveness criteria from the operational features, and corresponding limitations, of the suspicious transaction reporting system. The funnelling method was also used to identify those operational features and limitations of suspicious transaction reporting that have the most direct relevance to the early detection problem of suspicious transaction reporting.

Findings

There are some operational features of STR that give rise to certain limitations that undermine its effectiveness in terms of early detection of terrorist financing activities. The limitations of STR necessitate a search for criteria that will make STR effective in early detection of terrorist financing activities. Based on the operational features and their corresponding limitations, effectiveness criteria for STR have been derived in this study. It is shown how these effectiveness criteria can remove the limitations of STR.

Research limitations/implications

The list of operational features and the corresponding limitations based on which the effectiveness criteria have been derived may not be exhaustive. There may have other operational features, and corresponding limitations that also make STR largely ineffective in the early detection of terrorist financing activities, and for which more effectiveness criteria should also be derived.

Practical implications

The limitations and the effectiveness criteria will pave the way for redesigning STR in such a way that will make it highly useful for detecting financing activities relating to imminent terrorist attacks.

Social implications

The society will experience fewer terrorist attacks that will make the society peaceful, happy and vibrant.

Originality/value

In this study, the effectiveness criteria of STR for early detection of terrorist financing activities have been derived in an innovative way by deducing them from the operational features of STR and the corresponding limitations.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 11 December 2023

Sarah Knight, Abbie Maroño and David Keatley

The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to…

Abstract

Purpose

The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to other factors underlying extremist behaviours. While the end goal of many extremists may be functionally similar, the pathways into extremism vary, and the literature has demonstrated that a “one-size-fits-all” explanation does not exist. Motivational drivers are complex and dynamic; therefore, attempting to identify a terrorist “profile” has limited applied efficacy.

Design/methodology/approach

This study applied a temporal approach (“crime script analysis” or CSA) to identify, map and compare the sequential stages (or “scenes”) in the life histories of violent and non-violent extremists who have committed acts of extremism across different age groups. Crime scripts comprising mainly qualitative data for 40 male extremists (20 violent, 20 non-violent “cases”) were developed, and CSA was conducted according to the age at which they committed their first extremist offence.

Findings

Results demonstrated key temporal, developmental differences between the pathways of extremists who commit their first offence at different ages. One key difference was that for both the violent and non-violent extremists, those under 30 used the internet as a main means of joining networks and spreading information, whereas the over 30s made more personal, community links.

Originality/value

This research can aid identification of potential environmental triggers and potential increased susceptibility to triggers across certain age groups.

Details

Journal of Criminal Psychology, vol. 14 no. 2
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 2 November 2023

Amrou Awaysheh, Robert D. Klassen, Asad Shafiq and P. Fraser Johnson

Globalization and increased outsourcing have contributed to increased supply chain complexity, exposing firms to greater vulnerability in the areas of product safety and supply…

Abstract

Purpose

Globalization and increased outsourcing have contributed to increased supply chain complexity, exposing firms to greater vulnerability in the areas of product safety and supply chain security. Meanwhile, stakeholders pressure firms to ensure that their products are safe, and their supply chains are secure. Drawing from stakeholder theory, this paper aims to explore how the supply chain characteristics of distance and power affect the adoption of consumer protection (CP) practices, which ensure product safety and supply chain security.

Design/methodology/approach

Using primary survey data from a sample of Canadian manufacturing firms, this research examines the relationships among supply chain characteristics, adoption of CP practices and firm performance.

Findings

Analysis supported the use of two practices related to product safety (consumer education and product design) and three practices for supply chain security (packaging, tracking and authenticity). Greater cultural distance between the focal firm and its suppliers was positively associated with investments in safer design practices, while increased geographical distance between the focal firm and the customer was significantly related to increased consumer education. Moreover, as power of a focal firm relative to its suppliers increased, so too did investments in supply chain security. Finally, CP practices were related to improved operational performance along multiple dimensions.

Originality/value

This research focuses on the critical role of two key stakeholder groups in improving product safety and supply chain security: suppliers and customers. The authors add to the theoretical discussion of product safety and supply chain security by identifying critical differences between suppliers and customers for the focal firm. Second, the research informs the managerial community of the potential benefits of investments in CP practices.

Details

Supply Chain Management: An International Journal, vol. 29 no. 2
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 11 October 2022

Hafizah Mohd Latif, Norazida Mohamed, Morrison Handley-Schachler and Azhan Jalaludin

Money laundering weakens the role of the construction industry in stimulating economic growth. The purpose of this paper is to explore the connection between money laundering on…

Abstract

Purpose

Money laundering weakens the role of the construction industry in stimulating economic growth. The purpose of this paper is to explore the connection between money laundering on the construction sites and undocumented foreign workers, based on a narrative drawn from a qualitative research.

Design/methodology/approach

Throughout the study, qualitative methods, i.e. interviews, site visits and document analysis, were used. However, the data for this paper was primarily derived from an interview. Thematic analysis was used to analyse the data.

Findings

The findings show that construction personnel who have access to the business’s financial affairs are the most likely to engage in illicit transactions. The size of the project as well as the multiple layers of organisations involved made it easy for launderers to operate. The appealing commission provided incentives to opportunistic personnel. In this regard, the wages for undocumented workers, which were primarily paid in cash, provided a considerable opportunity for the subcontracting organisations to engage in money laundering.

Research limitations/implications

While the single narrative method with an omniscient narrator allows for the conceptualisation of a human experience with money laundering, the depth of information and interpretations is limited. Emerging qualitative research methods may be incorporated in the future to provide a more extensive information due to the fact that money laundering data is complex and sensitive that few people want to discuss.

Originality/value

The multidisciplinary approach of this research provides a pedagogical way that focuses primarily on the disciplines of construction management and business ethics to demonstrate real-world money laundering practice. Understanding such phenomenon on sites opens up key avenues for future research into developing an anti-money laundering regime for the construction industry.

Details

Journal of Money Laundering Control, vol. 26 no. 5
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 25 March 2024

Moses Agaawena Amagnya

The media is described as a fourth estate of the realm due to its ability to frame and shape discussions on governance and provide a stimulus for fighting corruption. But is the…

Abstract

Purpose

The media is described as a fourth estate of the realm due to its ability to frame and shape discussions on governance and provide a stimulus for fighting corruption. But is the media really an effective tool for fighting corruption? This question arises due to the possibility of the media being used for propaganda, biased reporting and media owners’ and journalists’ engagement in corruption. The current study addresses the question by exploring the relationship between the media and corruption from the perspectives of Ghanaian justice and anti-corruption officials.

Design/methodology/approach

The study adopts a qualitative approach by interviewing justice and anti-corruption officials across three administrative regions in Ghana.

Findings

The results show that while justice officials describe the media as a medium for accusing officials unjustifiably and exaggerating the scale of corruption, anti-corruption officials believe the media helps to fight corruption. In addition to uncovering and exposing public officials’ corruption, the media is also a double-edged sword characterised by intra-vigilance: the media hold “their own” (i.e. journalists fighting corruption) accountable through criticism and exposure of wrongdoings.

Practical implications

The double-edged nature of the media can strengthen and enhance the fight against corruption because anti-corruption actors and journalists will be cautious as misjudgements or errors committed will not be overlooked or concealed by the media. Therefore, anti-corruption agencies in Ghana can collaborate with the media to uncover and expose corruption committed by public officials and even journalists or media owners.

Originality/value

This study is the first in Ghana to explore the relationship between the media and corruption from the perspectives of justice and anti-corruption officials. The approach, frameworks and methodology adopted in this study can be applied in similar studies in other countries on the African continent and beyond.

Details

International Journal of Sociology and Social Policy, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0144-333X

Keywords

1 – 10 of 63