Search results

21 – 30 of over 6000
Article
Publication date: 23 August 2021

Hussain Syed Gowhor

This paper aims to inform the readers about the existing financial intelligence tools that are being used by financial intelligence units. It tries to demonstrate, with the help…

Abstract

Purpose

This paper aims to inform the readers about the existing financial intelligence tools that are being used by financial intelligence units. It tries to demonstrate, with the help of a literature review, what the limitations of these tools are and how these limitations hinder the potential of the financial intelligence tools for early detection of terrorist financing activities.

Design/methodology/approach

The literature review method was adopted to discuss the financial intelligence tools, their limitations and the implications of the limitations for early detection of terrorist financing activities.

Findings

It was found that although the financial intelligence tools were introduced with a view to detect terrorist financing activities early, there are some inherent limitations of the tools relating to technical design features and operational procedures that hinder early detection of terrorist financing activities.

Research limitations/implications

The existing financial intelligence tools need to be repaired by removing the inherent limitations of the tools.

Practical implications

The financial intelligence units should take into cognizance the importance of early detection of terrorist financing activities for preventing terrorist attacks and need to redesign the existing tools in such a way that make these tools effective for early detection of terrorist financing activities.

Social implications

Peace will be established in society by preventing terrorist attacks through early detection of terrorist financing activities.

Originality/value

The originality of the paper lies in identifying the limitations of the existing financial intelligence tools for the early detection of terrorist financing activities.

Details

Journal of Money Laundering Control, vol. 25 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 April 2006

Sally Leivesley

To describe anticipatory risk as a fundamental pillar for a framework of international law in relation to global terrorism.

511

Abstract

Purpose

To describe anticipatory risk as a fundamental pillar for a framework of international law in relation to global terrorism.

Design/methodology/approach

Economic terrorism and global terrorist transactions are used as a case study to demonstrate asymmetric financial crime and vulnerabilities of financial districts, economies and populations.

Findings

The act of anticipation of risk is quantifiable and imposes a duty to manage foreseeable catastrophic consequences. Such a duty in turn creates a proportionate reaction that can be recognised in law.

Practical implications

Recommendations are made for international discussions by jurists, global agreements through the United Nations and the G8 and for national laws, corporate governance standards and regulatory measures to become a seamless extension of the international framework.

Originality/value

Commercial law, criminal law and the international laws and conventions of war require a framework that defines foreseeability, catastrophic risk, uncertainty, adequacy and proportionality.

Details

Journal of Money Laundering Control, vol. 9 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 29 November 2023

Hussain Syed Gowhor

This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up…

Abstract

Purpose

This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up with the criteria, which will make this tool an effective one in early detection of terrorist financing activities.

Design/methodology/approach

Considering the research aim, this research uses the funnelling method for identifying effectiveness criteria. Funnelling is a method of literature review that helps find pertinent literature by refining the search through filtering the available research (Ridley, 2008). Using this method, the researcher first applied the criteria of actionable intelligence to filter the financial intelligence tools to select the most promising and important tool (suspicious transaction reporting) for early detection of terrorist financing activities. The funnelling method was also applied to derive the effectiveness criteria from the operational features, and corresponding limitations, of the suspicious transaction reporting system. The funnelling method was also used to identify those operational features and limitations of suspicious transaction reporting that have the most direct relevance to the early detection problem of suspicious transaction reporting.

Findings

There are some operational features of STR that give rise to certain limitations that undermine its effectiveness in terms of early detection of terrorist financing activities. The limitations of STR necessitate a search for criteria that will make STR effective in early detection of terrorist financing activities. Based on the operational features and their corresponding limitations, effectiveness criteria for STR have been derived in this study. It is shown how these effectiveness criteria can remove the limitations of STR.

Research limitations/implications

The list of operational features and the corresponding limitations based on which the effectiveness criteria have been derived may not be exhaustive. There may have other operational features, and corresponding limitations that also make STR largely ineffective in the early detection of terrorist financing activities, and for which more effectiveness criteria should also be derived.

Practical implications

The limitations and the effectiveness criteria will pave the way for redesigning STR in such a way that will make it highly useful for detecting financing activities relating to imminent terrorist attacks.

Social implications

The society will experience fewer terrorist attacks that will make the society peaceful, happy and vibrant.

Originality/value

In this study, the effectiveness criteria of STR for early detection of terrorist financing activities have been derived in an innovative way by deducing them from the operational features of STR and the corresponding limitations.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 7 November 2022

Carina Boufford and Noëlle O'Connor

This chapter examines the role that strategic marketing plans play throughout the process of destination recovery post terrorist attack for the purpose of encouraging the return…

Abstract

This chapter examines the role that strategic marketing plans play throughout the process of destination recovery post terrorist attack for the purpose of encouraging the return of tourists. It investigates the impact that strategic marketing plans have as a part of crisis management applying a mixed-method approach which utilises survey data examining future industry leaders to quantify perspectives regarding the relationship between terrorism, tourism and destination marketing. Furthermore, this chapter reviews destination marketing techniques employed by international locations to determine recovery strategies utilising marketing plans. Bali, Paris, Northern Ireland, New York, Sri Lanka, Syria, Tunisia and Turkey were selected as case studies because they have been the focus of significant research studies to date (Asia-Pacific Economic Cooperation (APEC): BBC News, 2019; Ferreira, Graciano, Leal, & Costa, 2019) which have primarily focused on the relationship between terrorism and tourism regarding the collapse of the tourism industry. A survey was issued to gain perspectives regarding the relationship between terrorism, tourism and destination marketing. Second, case study analysis was conducted to examine both successful and unsuccessful destination recovery strategies. Results indicate that destinations that utilised strategic marketing as a part of crisis management frameworks experienced the return of tourists and recovered. This research contributed to the development of an inclusive, universal crisis management framework encompassing strategic marketing plans as a tool for recovery.

Details

The Emerald Handbook of Destination Recovery in Tourism and Hospitality
Type: Book
ISBN: 978-1-80262-073-3

Keywords

Article
Publication date: 16 October 2007

Fletcher N. Baldwin and Theresa A. DiPerna

This paper aims to explore complexities of compliance with international and customary law when faced with terrorist threats. The paper's thesis asserts that terrorism cannot be…

1875

Abstract

Purpose

This paper aims to explore complexities of compliance with international and customary law when faced with terrorist threats. The paper's thesis asserts that terrorism cannot be successfully repelled unless the legitimacy of international and domestic law is adhered to by states out of a sense of reciprocal obligation in accordance with the principle of pacta sunt servanda (pacts shall be respected).

Design/methodology/approach

This paper examines US pronouncements in order to assess strategic validity.

Findings

While the Middle East, particularly Iraq, has been the focus of the US “War on terrorism,” the paper suggests two questions: what has been the US response to terrorist threats in the Americas? Have US national security priorities post‐9/11 been unnecessarily diverted from the Americas where much needed support is promised but lacking, and instead have resources been concentrated far beyond domestic and international norms?

Originality/value

The paper examines the US national security priorities, concluding that they have been unproductively diverted from the Americas to the Middle East in general and Iraq in particular. The US fixation upon Middle East “regime‐change”, while neglecting to recognize the dangerous nexus and presence of organized crime and terrorist organizations in the Americas, is illustrative of how the present administration has diverted its post.

Details

Journal of Financial Crime, vol. 14 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 April 2002

GORDON WOO

Traditionally, terrorism risk has been priced based exclusively on the relationship between supply and demand in the insurance market, with no basis in actuarial principles. This…

4737

Abstract

Traditionally, terrorism risk has been priced based exclusively on the relationship between supply and demand in the insurance market, with no basis in actuarial principles. This article discusses how the tragic events of September 11, 2001, have irrevocably changed the market for terrorism insurance, since terrorism has become a U.S. catastrophe risk. The author states that since insurers seek to quantify risk distributed over several months (versus a period of only a few days), quantitative assessment of terrorism risk may be achievable. The article proceeds to address the challenge of quantifying terrorism risk, and ultimately suggests that developing quantitative terrorism risk models may provide a foundation for securitizing and trading terrorism risk. The author introduces three examples of potential alternative risk transfer instruments for terrorism risk: 1) a catastrophe bond triggered by workers' compensation claims from extreme terrorism‐related events; 2) a catastrophe bond to cover life insurers from losses related to an attack employing a weapon of mass destruction; and 3) a contingent financing instrument triggered by a terrorism event whose natural buyers are financial short‐sellers.

Details

The Journal of Risk Finance, vol. 4 no. 1
Type: Research Article
ISSN: 1526-5943

Article
Publication date: 18 October 2021

Fabian Maximilian Teichmann

The purpose of this paper is to illustrate how intelligent terrorist financiers avoid detection when acquiring and subsequently transferring financial assets to finance terrorism…

1076

Abstract

Purpose

The purpose of this paper is to illustrate how intelligent terrorist financiers avoid detection when acquiring and subsequently transferring financial assets to finance terrorism. Particular emphasis is placed on cryptocurrency.

Design/methodology/approach

A qualitative content analysis of 30 semi-standardised expert interviews with both criminals and prevention experts led to the identification of means for the circumvention of current combat the financing of terrorism (CFT) measures with a focus on cryptocurrency.

Findings

The findings illustrate, for the benefit of law enforcement agencies, investigators, regulating authorities and legislators, the specific low-risk methods that terrorist financiers use to generate and transfer assets. These findings help to develop more effective prevention methods.

Research limitations/implications

Qualitative findings from the analysis of semi-standardised interviews are limited to the 30 interviewees’ perspectives.

Practical implications

Identification of gaps in existing CFT mechanisms provides compliance officers, law enforcement agencies and legislators with valuable insights into how criminals operate.

Originality/value

The existing literature focuses on organisations that combat terrorist financing and the improvement of CFT measures. This article outlines how terrorist financiers avoid detection. Both preventative and criminal perspectives are considered.

Details

Journal of Financial Regulation and Compliance, vol. 30 no. 1
Type: Research Article
ISSN: 1358-1988

Keywords

Expert briefing
Publication date: 5 September 2016

His death reignites debates about whether such targeted killings are effective in reducing the scale or impact of subsequent terrorist attacks.

Details

DOI: 10.1108/OXAN-DB213386

ISSN: 2633-304X

Keywords

Geographic
Topical
Book part
Publication date: 1 June 2004

John D Blair, Myron D Fottler and Albert C Zapanta

This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist…

Abstract

This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist activity within the United States, and how these events have led to current situations. It also provides a model for health care leaders to follow when looking at a bioterrorist attack. The model includes descriptions of how the articles within this book relate to an overall bioterrorist formula. Through this, the reader shall be able to deduce which individual article fits into the vastness of healthcare research pertaining to bioterrorism.

Details

Bioterrorism Preparedness, Attack and Response
Type: Book
ISBN: 978-1-84950-268-9

Book part
Publication date: 21 June 2014

Giampiero Giacomello

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak…

Abstract

Purpose

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.

Methodology/approach

Review of relevant literature.

Findings

The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.

Research limitations/implications

Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.

Originality/value of the chapter

The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.

21 – 30 of over 6000