Search results

1 – 10 of 133
Open Access
Article
Publication date: 5 February 2020

Amira S.N. Tawadros

The purpose of this study is twofold; first, it aims to understand the underlying dynamics of the organizations behind the terrorist attacks, and second, to investigate the…

2712

Abstract

Purpose

The purpose of this study is twofold; first, it aims to understand the underlying dynamics of the organizations behind the terrorist attacks, and second, to investigate the dynamics of terrorist organizations in relation to one another to detect whether there exist shared patterns of terror between different organizations.

Design/methodology/approach

To achieve this purpose, the researcher proposes a computational algorithm that extracts data from global terrorism database (GTD); calculates similarity indices between different terrorist groups; generates a network data file from the calculated indices; and apply network analysis techniques to the extracted data. The proposed algorithm includes applying SQL database codes for data extraction, building a tailored C# computer software to calculate similarity indices and generate similarity networks and using GEPHI software to visualize the generated network and calculate network metrics and measures.

Findings

Applying the proposed algorithm to Egypt, the results reveal different shared patterns of terror among different terrorist groups. This helps us in creating a terror landscape for terrorist groups playing in Egypt.

Originality/value

The importance of the study lies in that it proposes a new algorithm that combines network analysis with other data-manipulation techniques to generate a network of similar terror groups.

Details

Journal of Humanities and Applied Social Sciences, vol. 2 no. 2
Type: Research Article
ISSN: 2632-279X

Keywords

Open Access
Article
Publication date: 19 January 2024

Ozge Kozal, Mehmet Karacuka and Justus Haucap

In this study the authors aim to comprehensively investigate the determinants of voting behavior in Turkey, with a specific focus on the dynamics of the center-periphery debate…

Abstract

Purpose

In this study the authors aim to comprehensively investigate the determinants of voting behavior in Turkey, with a specific focus on the dynamics of the center-periphery debate. Mainly, the authors focus on regional voting patterns during the period that is dominated by the Justice and Development Party (JDP/AKP) in the elections. The authors apply the random effects generalized least squares (GLS) methodology, and analyze electoral data covering four pivotal parliamentary elections (2007, 2011, 2015 and 2018) across all 81 provinces (NUTS III regions). The authors individually examine voting dynamics of the four major parties in parliament: the JDP/AKP, the Republican People's Party (RPP/CHP), the Nationalist Movement Party (NMP/MHP) and the Peoples' Democratic Party (PDP/HDP). The authors contribute to a comprehensive understanding of how socioeconomic cleavages, economic performance, party alignment and social dynamics shape voter preferences in the Turkish context, thereby addressing gaps in the existing literature.

Design/methodology/approach

This research employs an ecological study of Turkish NUTS III sub-regions, covering national elections from 2007 to 2018. The authors utilize the random effects GLS method to account for heteroscedasticity and time effects. The inclusion of the June and November 2015 elections enables a comprehensive analysis of the evolving dynamics in Turkish voting behavior. The results remain robust when applying pooled OLS and fixed effect OLS techniques for control.

Findings

The study's findings reveal that economic performance, specifically economic growth, plays a pivotal role in the sustained dominance of the JDP/AKP party. Voters closely associate JDP preference with economic growth, resulting in higher voting shares during periods of economic prosperity. Along with economic growth; share of agriculture in regions' GDP, female illiteracy rate, old population rate, net domestic migration, terrorism and party alignment are also influential factors in the Turkish case. Furthermore, differences among sociocultural groups, and East–West dichotomy seem to be important factors that reveal the impact of social cleavages to understand electoral choice in Turkey.

Originality/value

This study contributes to the existing literature by offering a comprehensive multidimensional analysis of electoral behavior in Turkey, focusing on the JDP/AKP dominance period. The main contribution of this study is its multidimensional perspective on the power bases of all main parties, considering key voter choice theories (cleavages, party alignment and retrospective economic performance voting) that have not been systematically analyzed in prior research. The main research question of this study is to examine which factors affect voting behavior in Turkey and how the dynamics of center-periphery or eastern-western region voting behavior under the JDP hegemony can be explained. The contribution of this study consists not only in its empirical testing of panel data approaches but also in its comprehensive analysis of four major political parties. Building upon existing studies in the literature, this research seeks to extend the understanding of voting dynamics for the four main parties in the parliament — JDP/AKP, RPP/CHP, NMP/MHP and PPDP/HDP — by delving into their dynamics individually, thereby expanding the scope of previous studies. This study aims to make a contribution by not only empirically testing panel data approaches but also conducting a comprehensive analysis of four major political parties. Furthermore, the separate inclusion of the 2015 elections and utilization of a panel data approach enrich the analysis by capturing the evolving dynamics of Turkish voting behavior. The study underscores the significance of socioeconomic factors, economic performance and social cleavages for voters' choices within the context of a dominant party rule.

Details

Review of Economics and Political Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 6 December 2023

William Gaviyau and Athenia Bongani Sibindi

The purpose of this study is to examine the South African banks’ customer due diligence (CDD) practices in the fintech era to mitigate money laundering (ML) risks and ensure…

Abstract

Purpose

The purpose of this study is to examine the South African banks’ customer due diligence (CDD) practices in the fintech era to mitigate money laundering (ML) risks and ensure financial stability. Financial technologies have brought substantial transformations to the financial services sector. However, such technologies have exposed the sector to emerging risks that threaten the integrity and stability of the financial system globally. Before any bank–customer relationship is established, proper customer background checks must be conducted. These background checks enable financial institutions to validate information provided and ensure customers are properly risk profiled. Failure to risk profile customers could result in financial institutions being used as conduits for ML. Undoubtedly, CDD procedures are pivotal to overall anti-money laundering efforts and curbing financing terrorism in a regulatory framework.

Design/methodology/approach

A qualitative research approach was adopted to address the research questions of the study. Given the confidentiality associated with the financial services sector, data triangulation was used in blending mainly secondary and primary data sources. Secondary data sources used in the study were published reports available in the public domain that were corroborated with subject matter experts’ interviews.

Findings

Based on the findings of this study, it is concluded that in South Africa, technological solutions have been incorporated into CDD functions, which is now risk-based (enhanced due diligence). Also, legally, South Africa has incorporated the biometrics, integration with Department of Home Affairs and Companies and Intellectual Property Commission databases, customer consent to third-party sources with the Financial Intelligence Centre Act and the Protection of Personal Information Act.

Originality/value

The shift towards digital banking in South Africa results in increased data and dynamic risk profiling. This study advocates a policy shift requiring a risk-based approach to mitigating emerging ML risks (in particular digital laundering), especially in the wake of South Africa’s recent greylisting by the Financial Action Task Force.

Open Access
Article
Publication date: 19 May 2023

Georgios Pavlidis

This paper aims to critically examine the European Union’s legislative initiative to establish an Anti-Money Laundering Authority (AMLA), which will introduce union-level…

4868

Abstract

Purpose

This paper aims to critically examine the European Union’s legislative initiative to establish an Anti-Money Laundering Authority (AMLA), which will introduce union-level supervision and provide support to national supervisors in the field of anti-money laundering and countering the financing of terrorism (AML/CFT), as well as to financial intelligence units (FIUs) in European Union (EU) member states. The paper discusses why this initiative was deemed necessary, which are the key objectives, rules and principles of AMLA and which challenges and opportunities will emerge as AMLA becomes operational.

Design/methodology/approach

This paper draws on reports, legislation, legal scholarship and other open-source data on the EU legislative initiative to establish a new AMLA.

Findings

AMLA will provide a comprehensive framework for EU-level AML/CFT supervision and for cooperation among FIUs. If all organisational challenges are properly addressed, the new authority will significantly enhance the EU’s ability to tackle money laundering and terrorism financing.

Originality/value

To the best of the author’s knowledge, this study is one of the first to examine the mission, governance and supervision mechanisms of the EU’s AMLA, as well as the challenges and opportunities associated with its functioning.

Open Access
Article
Publication date: 6 December 2022

Pieter Lagerwaard

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core…

1989

Abstract

Purpose

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core practices of collecting, analysing and disseminating financial intelligence.

Design/methodology/approach

Because FIU practices are often secret and its transaction data classified as state secrets, the FIU’s daily operational activities remain obscure. Drawing on interviews, public reports and an online training course, this study encircles secrecy and offers a fine-grained analysis of the FIU's core activities.

Findings

The article finds that the FIU plays a pivotal role in financial surveillance because it can operate at various intersections. An FIU operates at the intersection of finance and security, in between the public and private sector and at the national and international domain. This pivotal role makes the FIU indispensable in the surveillance of payment systems and spending behavior.

Social implications

The article poses that the desirability and effectiveness of financial surveillance has to date not received sufficient consideration, while it affects (the privacy of) anyone with a bank account. The article asks: is it ethically justifiable that transaction information is declared suspect, investigated, and shared nationally and internationally, without the individual or entity concerned officially being notified and legally named a suspect?

Originality/value

This case-study is not only relevant for the study of finance/security, AML/CFT and financial surveillance, but also to policy makers and the broader public who merit an understanding of how their financial behaviour is being surveilled.

Details

Journal of Money Laundering Control, vol. 26 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 13 July 2020

Dalia Hamed

The purpose of this study is to apply a corpus-assisted analysis of keywords and their collocations in the US presidential discourse from Clinton to Trump to discover the meanings…

4063

Abstract

Purpose

The purpose of this study is to apply a corpus-assisted analysis of keywords and their collocations in the US presidential discourse from Clinton to Trump to discover the meanings of these words and the collocates they have. Keywords are salient words in a corpus whose frequency is unusually high (positive keywords) or low (negative keywords) in comparison with a reference corpus. Collocation is the co-occurrence of words.

Design/methodology/approach

To achieve this purpose, the investigation of keywords and collocations is generated by AntConc, a corpus processing software.

Findings

This analysis leads to shed light on the similarities and/or differences amongst the past four American presidents concerning their key topics. Keyword analysis through keyness makes it evident that Clinton and Obama, being Democrats, demonstrate a clear tendency to improve Americans’ life inside their social sphere. Obama surpasses Clinton as regard foreign affairs. Clinton and Obama’s infrequent subjects have to do with terrorism and immigration. This complies with their condensed focus on social and economic improvements. Bush, a republican, concentrates only on external issues. This is proven by his keywords signifying war against terrorism. Bush’s negative use of words marking cooperative actions conforms to his positive use of words indicating external war. Trump’s positive keywords are about exaggerated descriptions without a defined target. He also shows an unusual frequency in referring to his name and position. His words used with negative keyness refer to reforming programs and external issues. Collocations around each top content keyword clarify the word and harmonize with the presidential orientation negotiated by the keywords.

Research limitations/implications

Limitations have to do with the issue of the accurate representation of the samples.

Originality/value

This research is original in its methodology of applying corpus linguistics tools in the analysis of presidential discourses.

Details

Journal of Humanities and Applied Social Sciences, vol. 3 no. 2
Type: Research Article
ISSN: 2632-279X

Keywords

Open Access
Article
Publication date: 28 February 2023

Onyeka John Chukwuka, Jun Ren, Jin Wang and Dimitrios Paraskevadakis

Unforeseen events can disrupt the operational process and negatively impact emergency resources optimization and its supply chain. A limited number of studies have addressed risk…

2548

Abstract

Purpose

Unforeseen events can disrupt the operational process and negatively impact emergency resources optimization and its supply chain. A limited number of studies have addressed risk management issues in the context of emergency supply chains, and this existing research lacks inbuilt and practical techniques that can significantly affect the reliability of risk management outcomes. Therefore, this paper aims to identify and practically analyze the specific risk factors that can most likely disrupt the normal functioning of the emergency supply chain in disaster relief operations.

Design/methodology/approach

This paper has used a three-step process to investigate and evaluate risk factors associated with the emergency supply chain. First, the study conducts a comprehensive literature review to identify the risk factors. Second, the research develops a questionnaire survey to validate and classify the identified risk factors. At the end of this step, the study develops a hierarchical structure. Finally, the research investigates the weighted priority of the validated risk factors using the fuzzy-analytical hierarchy process (FAHP) methodology. Experts were required to provide subjective judgments.

Findings

This paper identified and validated 28 specific risk factors prevalent in emergency supply chains. Based on their contextual meanings, the research classified these risk factors into two main categories: internal and external risk factors; four subcategories: demand, supply, infrastructural and environmental risk factors; and 11 risk types: forecast, inventory, procurement, supplier, quality, transportation, warehousing, systems, disruption, social and political risk factors. The most significant risk factors include war and terrorism, the absence of legislative rules that can influence and support disaster relief operations, the impact of cascading disasters, limited quality of relief supplies and sanctions and constraints that can hinder stakeholder collaboration. Therefore, emergency supply chain managers should adopt appropriate strategies to mitigate these risk factors.

Research limitations/implications

This study will contribute to the general knowledge of risk management in emergency supply chains. The identified risk factors and structural hierarchy taxonomic diagram will provide a comprehensive risk database for emergency supply chains.

Practical implications

The research findings will provide comprehensive and systemic support for respective practitioners and policymakers to obtain a firm understanding of the different risk categories and specific risk factors that can impede the effective functioning of the emergency supply chain during immediate disaster relief operations. Therefore, this will inform the need for the improvement of practices in critical aspects of the emergency supply chain through the selection of logistics and supply chain strategies that can ensure the robustness and resilience of the system.

Originality/value

This research uses empirical data to identify, categorize and validate risk factors in emergency supply chains. This study contributes to the theory of supply chain risk management. The study also adopts the fuzzy-AHP technique to evaluate and prioritize these risk factors to inform practitioners and policymakers of the most significant risk factors. Furthermore, this study serves as the first phase of managing risk in emergency supply chains since it motivates future studies to empirically identify, evaluate and select effective strategies that can eliminate or minimize the effects of these risk factors.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 13 no. 3
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Book part
Publication date: 6 May 2019

Michael Rigby, Shalmali Deshpande, Daniela Luzi, Fabrizio Pecoraro, Oscar Tamburis, Ilaria Rocco, Barbara Corso, Nadia Minicuci, Harshana Liyanage, Uy Hoang, Filipa Ferreira, Simon de Lusignan, Ekelechi MacPepple and Heather Gage

In order to assess the state of health of Europe’s children, or to appraise the systems and models of healthcare delivery, data about children are essential, with as much…

Abstract

In order to assess the state of health of Europe’s children, or to appraise the systems and models of healthcare delivery, data about children are essential, with as much precision and accuracy as possible by small group characteristic. Unfortunately, the experience of the Models of Child Health Appraised (MOCHA) project and its scientists shows that this ideal is seldom met, and thus the accuracy of appraisal or planning work is compromised. In the project, we explored the data collected on children by a number of databases used in Europe and globally, to find that although the four quinquennial age bands are common, it is impossible to represent children aged 0–17 years as a legally defined group in statistical analysis. Adolescents, in particular, are the most invisible age group despite this being a time of life when they are rapidly changing and facing increasing challenges. In terms of measurement and monitoring, there is little progress from work of nearly two decades ago that recommended an information system, and no focus on the creation of a policy and ethical framework to allow collaborative analysis of the rich anonymised databases that hold real-world people-based data. In respect of data systems and surveillance, nearly all systems in European society pay lip service to the importance of children, but do not accommodate them in a practical and statistical sense.

Details

Issues and Opportunities in Primary Health Care for Children in Europe
Type: Book
ISBN: 978-1-78973-354-9

Keywords

Open Access
Article
Publication date: 12 December 2019

Ghada Ahmed Abdel Aziz

This paper aims to explore to what extent can the Saudi–US alliance endure, given the several challenges it has faced over the past decade. Using a conceptual framework from the…

3570

Abstract

Purpose

This paper aims to explore to what extent can the Saudi–US alliance endure, given the several challenges it has faced over the past decade. Using a conceptual framework from the alliance theory, the paper will trace the historical evolution of the alliance between the two countries, then will identify some of the challenges that have faced the alliance on both the regional and bilateral levels, and finally will assess the impact of these challenges on the resilience of the Saudi–US alliance.

Design/methodology/approach

This paper will use the alliance theory literature to analyze the challenges and the resilience of the Saudi–US relations.

Findings

The Saudi–US alliance has encountered several challenges in the past decade such as the Arab spring, the Iranian nuclear deal and the Civil War in Syria and Yemen. However, this alliance proved to be resilient, and the strategic partnership between the two countries managed to overcome these challenges.

Originality/value

The importance of this paper stems from the fact that the USA and the Saudi Arabia are two pivotal countries, and their relationship affects regional and international dynamics. The paper contributes to the literature on the Saudi–US bilateral relations as well as their views on recent regional issues such as the Arab Spring, the civil war in Yemen and Syria. Assessing the limits and potentials of the alliance between the two countries could also help us understand the future of regional developments in the Middle East.

Details

Review of Economics and Political Science, vol. 8 no. 3
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 30 September 2019

Muhammad Asif, Prem Chhetri and Rajiv Padhye

This paper explores the interaction and impact of political disruptions on textile supply chain performance in Pakistan. A qualitative approach is adopted to explore the linkages…

Abstract

This paper explores the interaction and impact of political disruptions on textile supply chain performance in Pakistan. A qualitative approach is adopted to explore the linkages and relationships between political disruptions and supply chain disruptions and performance. Semi-structured interviews were conducted at 25 different textile manufacturing firms. This study confirmed the prevalence of severe and variegated impacts of political disruptions on the textile supply chain. Supply chain disruption is found to be a key mediating factor that directly and indirectly affect supply chain performance through an increased production and delivery lead-time, transportation delays, interruptions of raw material supplies to plants and distributors and the restricted access to workplaces for suppliers and workers. The linkages are represented through vicious circles that illustrate the interactions and inter-relationships between disrupted supply chain and performance. This study provides empirical evidence to help government to formulate pertinent labour laws and industrial policy to mitigate political disruptions and minimise deleterious effects of supply chain disruption on production and distribution networks whilst respecting and protecting the democratic rights of people.

Details

Journal of International Logistics and Trade, vol. 17 no. 3
Type: Research Article
ISSN: 1738-2122

Keywords

Access

Only Open Access

Year

All dates (133)

Content type

1 – 10 of 133