Search results
1 – 10 of 48Recent developments in the EU’s anti-corruption strategy have brought the EU closer to meeting the UNCAC’s objectives, i.e. the Proposal for a Directive on combating corruption…
Abstract
Purpose
Recent developments in the EU’s anti-corruption strategy have brought the EU closer to meeting the UNCAC’s objectives, i.e. the Proposal for a Directive on combating corruption (2023) and the Proposal for a Directive on Asset Recovery and Confiscation (2022). This paper aims to discuss these developments from the perspective of the UNCAC, to identify missing elements in the EU’s asset recovery mechanisms.
Design/methodology/approach
Critical approach towards EU anti-corruption policy (discussing the problems and solutions). Review of EU developments in asset recovery law.
Findings
There is a political will on the part of the EU to fight corruption through the rules enshrined in the UNCAC. However, improving EU law by introducing a new type of confiscation of unexplained wealth and criminalising illicit enrichment, without establishing convergent rules for the return of corrupt assets from EU territory to the countries of origin, cannot be seen as sufficient action to achieve the UNCAC’s objectives. In modelling mechanisms of the return of assets, the EU should search for solutions to overcome the difficulties resulting from the ordre public clause remaining a significant factor conditioning mutual legal assistance.
Originality/value
This paper discusses the possible input of the EU, as a non-State Party to the UNCAC, to advance implementing the UNCAC solutions on asset recovery by establishing convergent rules for the return of corrupt assets from EU territory to countries of origin.
Details
Keywords
James Higgs and Stephen Flowerday
This paper aims to investigate how best to classify money laundering through online video games (i.e. virtual laundering). Currently, there is no taxonomy available for scholars…
Abstract
Purpose
This paper aims to investigate how best to classify money laundering through online video games (i.e. virtual laundering). Currently, there is no taxonomy available for scholars and practitioners to refer to when discussing money laundering through online video games. Without a well-defined taxonomy it becomes difficult to reason through, formulate and implement effective regulatory measures, policies and security controls. As such, efforts to prevent and reduce virtual laundering incidence rates are hampered.
Design/methodology/approach
This paper proposes three mutually exclusive virtual laundering categorizations. However, instead of fixating on the processes undergirding individual instances of virtual laundering, it is argued that focusing on the initial locale of the illicit proceeds provides the appropriate framing within which to classify instances of virtual laundering. Thus, the act of classification becomes an ontological endeavour, rather than an attempt at elucidating an inherently varied process (as is common of the placement, layering and integration model).
Findings
A taxonomy is proposed that details three core virtual laundering processes. It is demonstrated how different virtual laundering categories have varied levels of associated risk, and thus, demand unique interventions.
Originality/value
To the best of the authors’ knowledge, this is the first taxonomy available in the knowledge base that systematically classifies instances of virtual laundering. The taxonomy is available for scholars and practitioners to use and apply when discussing how to regulate and formulate legislation, policies and appropriate security controls.
Details
Keywords
The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks…
Abstract
Purpose
The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks that protect consumers, combat money laundering and address risks linked to digital assets. Conventional approaches to confiscation and anti-money laundering are deemed insufficient in this evolving landscape. The absence of a central authority and the use of encryption hinder the identification of asset owners and the tracking of illicit activities. Moreover, the international and cross-border nature of digital assets complicates matters, demanding global coordination. The purpose of this study is to highlight that the effective combat of money laundering, legislative action, innovative investigative techniques and public–private partnerships are crucial.
Design/methodology/approach
The focal point of this paper is Australia’s approach to law enforcement in the realm of digital assets. It underscores the pivotal role of robust confiscation mechanisms in disrupting criminal networks operating through digital means. The paper firmly asserts that staying ahead of the curve and maintaining an agile stance is paramount. Criminals are quick to embrace emerging technologies, necessitating proactive measures from policymakers and law enforcement agencies.
Findings
It is argued that an agile and comprehensive approach is vital in countering money laundering, as criminals adapt to new technologies. Policymakers and law enforcement agencies must remain proactively ahead of these developments to efficiently identify, trace and seize digital assets involved in illicit activities, thereby safeguarding the integrity of the global financial system.
Originality/value
This paper provides a distinctive perspective by examining Australia’s legal anti-money laundering and counterterrorism financing framework, along with its law enforcement strategies within the realm of the digital asset landscape. While there is a plethora of literature on both asset confiscation and digital assets, there is a noticeable absence of exploration into their interplay, especially within the Australian context.
Details
Keywords
Miguel Calvo and Marta Beltrán
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…
Abstract
Purpose
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.
Design/methodology/approach
The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.
Findings
The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.
Originality/value
The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.
Details
Keywords
Jonatas Dutra Sallaberry, Lauren Dal Bem Venturini, Isabel Martínez-Conesa and Leonardo Flach
This study aims to analyze the relationship between the personal responsibility, the intrinsic knowledge of the norms and the knowledge of signs of money laundering of accountants.
Abstract
Purpose
This study aims to analyze the relationship between the personal responsibility, the intrinsic knowledge of the norms and the knowledge of signs of money laundering of accountants.
Design/methodology/approach
The research was developed with responses from 381 Brazilian accounting professionals through a survey, statistically analyzed using structural equations.
Findings
The results indicate that personal responsibility directly affects the levels of intrinsic knowledge and knowledge about signs of money laundering; however, the different dimensions of knowledge were not related to each other.
Practical implications
From these results, organizations can clarify the individual about their responsibility, optimizing the use of training and mitigating costs, with greater sustainability and security for the organization, employees and business partners.
Social implications
The results contribute to the construction and modeling of latent constructs on money laundering knowledge, with validity, reliability and statistical significance.
Originality/value
This research discusses and empirically explores the knowledge about money laundering of the accountants’, one of the main explanatory factors of whistleblowing in business.
Details
Keywords
Olusola Joshua Olujobi and Tunde Ebenezer Yebisi
The purpose of this study is to examine the corruption prevalent in the distribution of COVID-19 palliatives during the lockdown and movement restrictions in the country. This…
Abstract
Purpose
The purpose of this study is to examine the corruption prevalent in the distribution of COVID-19 palliatives during the lockdown and movement restrictions in the country. This study seeks to analyse the current state of corruption in the distribution of COVID-19 palliatives and public health facilities in Nigeria while also providing a legal insight and strategic blueprint to combat corruption. To this end, this study will address the current legal framework for combating corruption and build upon this to formulate a working strategy for tackling corruption in the future.
Design/methodology/approach
Using a doctrinal legal research methodology, this study draws upon existing literature, tertiary data sources and information from the Nigeria Centre for Disease Control. The collected data is analysed and compared with current literature to identify key findings. Rent-seeking and utilitarian theories of the law were examined to guide this study. This study offers useful insights into combating corruption. The use of this method is justified, as it enhances the credibility of the findings on the importance of strategies for future emergencies. This legal research approach is consistent with the law and can be easily verified. The empirical aspect of this study involved a survey of multidimensional health-care and economic data set of 36 states in Nigeria plus the Federal Capital Territory on COVID-19 in Nigeria. A survey linearised regression model was estimated to determine the influence of government revenue and public health-care facilities in the control of the virus spread in Nigeria.
Findings
This study reveals the need for emphasis on the imperative of combating corruption in the distribution of COVID-19 palliatives and establishing economic resilience through transparent and accountable practices, supported by legal frameworks.
Research limitations/implications
Rent-seeking and utilitarian theories of law are evaluated because of their impacts on combating corruption. The limitation of this study is the intricacy of gathering data on COVID-19 palliatives corruption in Nigeria because of secrecy and the absence of reliable data on the subject.
Practical implications
Estimating the exact number of stolen palliatives and their fiscal impact on Nigeria's economy proves to be a formidable task because of the covert nature of corruption. This study equips policymakers in Nigeria with a better understanding of the legal challenges posed by corruption in the health care sector and provides an effective strategy to combat it.
Social implications
The lack of reliable data on the extent of palliative theft hinders the ability of lawmakers to enact effective legislation and strategies for combating corruption in the distribution of COVID-19 palliatives and addressing future emergencies in Nigeria. The policy implications of this study can assist policymakers in Nigeria and other countries in formulating measures to combat corruption in the distribution of COVID-19 palliatives and other future emergencies. Furthermore, it recommends the overhaul of anti-corruption laws and mechanisms in Nigeria to ensure effective measures against corruption.
Originality/value
In conclusion, this study contributes to knowledge by proposing a legal model centred on people's participation to enhance transparency and accountability in future palliative distribution processes. This study recommends legal strategies that can effectively address corruption in future emergencies or shocks. This study proposes a strategic blueprint to tackle corruption in the future. This blueprint includes an analysis of existing laws and regulations, as well as potential policy changes and legislative reform. This study also includes recommendations for improved enforcement and oversight mechanisms and for improved public awareness and education. As part of this, this study considers the potential for public–private partnerships to increase transparency and accountability in public health and health-care services.
Details
Keywords
Olusola Joshua Olujobi and Oshobugie Suleiman Irumekhai
The purpose of this paper is to scrutinise the intricate relationship between the inadequate enforcement of anti-corruption laws and the application of good governance and the…
Abstract
Purpose
The purpose of this paper is to scrutinise the intricate relationship between the inadequate enforcement of anti-corruption laws and the application of good governance and the persisting prevalence of coups d'état and poverty in Africa.
Design/methodology/approach
This paper uses a doctrinal legal research approach, synthesising existing literature while extensively analysing primary and secondary legal sources. Its primary aim is to scrutinise the intricate relationship between the inadequate enforcement of anti-corruption laws and the application of good governance and the persisting prevalence of coups d'état and poverty in Africa. The choice of case study countries Burkina Faso, Chad, Gabon, Guinea, Mali, Niger and Sudan stems from their historical significance, regional diversity, data accessibility and potential insights into the interplay among anti-corruption enforcement, governance, poverty and coups d'état in Africa.
Findings
The enforcement of anti-corruption laws and the promotion of good governance are indispensable for democracy and economic stability; their suboptimal enforcement directly contributes to coups d'état and the worsening of poverty in African nations. It emphasises the imperative for African countries to consistently and proficiently enforce anti-corruption laws and adhere to principles of good governance, effectively and responsibly, to mitigate coups d'état and alleviate poverty in the region.
Originality/value
This study designs a model strategy for combating coups d'état and corruption in Africa as contribution to knowledge in the field of study.
Details
Keywords
Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…
Abstract
Purpose
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.
Design/methodology/approach
For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.
Findings
The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.
Originality/value
Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.
Details
Keywords
Saeed Reza Mohandes, Atul Kumar Singh, Abdulwahed Fazeli, Saeed Banihashemi, Mehrdad Arashpour, Clara Cheung, Obuks Ejohwomu and Tarek Zayed
Previous research has demonstrated that Digital Twins (DT) are extensively employed to improve sustainable construction methods. Nonetheless, their uptake in numerous nations is…
Abstract
Purpose
Previous research has demonstrated that Digital Twins (DT) are extensively employed to improve sustainable construction methods. Nonetheless, their uptake in numerous nations is still constrained. This study seeks to identify and examine the digital twin’s implementation barriers in construction building projects to augment operational performance and sustainability.
Design/methodology/approach
An iterative two-stage approach was adopted to explore the phenomena under investigation. General DT Implementation Barriers were first identified from extant literature and subsequently explored using primary questionnaire survey data from Hong Kong building industry professionals.
Findings
Survey results illustrated that Lack of methodologies and tools, Difficulty in ensuring a high level of performance in real-time communication, Impossibility of directly measuring all data relevant to the DT, need to share the DT among multiple application systems involving multiple stakeholders and Uncertainties in the quality and reliability of data are the main barriers for adopting digital twins' technology. Moreover, Ginni’s mean difference measure of dispersion showed that the stationary digital twin’s barriers adoption is needed to share the DT among multiple application systems involving multiple stakeholders.
Practical implications
The study’s findings offer valuable guidance to the construction industry. They help stakeholders adopt digital twins' technology, which, in turn, improves cost efficiency and sustainability. This adoption reduces project expenses and enhances environmental responsibility, providing companies a competitive edge in the industry.
Originality/value
This research rigorously explores barriers to Digital Twin (DT) implementation in the Hong Kong construction industry, employing a systematic approach that includes a comprehensive literature review, Ranking Analysis (RII) and Ginni’s coefficient of mean difference (GM). With a tailored focus on Hong Kong, the study aims to identify, analyze and provide novel insights into DT implementation challenges. Emphasizing practical relevance, the research bridges the gap between academic understanding and real-world application, offering actionable solutions for industry professionals, policymakers and researchers. This multifaceted contribution enhances the feasibility and success of DT implementation in construction projects within the Architecture, Engineering and Construction (AEC) sector.
Details
Keywords
George (Yiorgos) Allayannis, Paul Tudor Jones and Aaron Fernstrom
The case describes a hypothetical hedge fund manager who is examining whether to invest in bitcoin. The case discusses potential risks and rewards of investing in bitcoin, the…
Abstract
The case describes a hypothetical hedge fund manager who is examining whether to invest in bitcoin. The case discusses potential risks and rewards of investing in bitcoin, the role of bitcoin and digital currencies more broadly, and financial innovation in the space, such as ICOs. It can be taught as part of a second-year MBA elective course in investments, financial institutions/capital markets, or fintech.
Details