Search results
21 – 30 of over 6000This paper aims to inform the readers about the existing financial intelligence tools that are being used by financial intelligence units. It tries to demonstrate, with the help…
Abstract
Purpose
This paper aims to inform the readers about the existing financial intelligence tools that are being used by financial intelligence units. It tries to demonstrate, with the help of a literature review, what the limitations of these tools are and how these limitations hinder the potential of the financial intelligence tools for early detection of terrorist financing activities.
Design/methodology/approach
The literature review method was adopted to discuss the financial intelligence tools, their limitations and the implications of the limitations for early detection of terrorist financing activities.
Findings
It was found that although the financial intelligence tools were introduced with a view to detect terrorist financing activities early, there are some inherent limitations of the tools relating to technical design features and operational procedures that hinder early detection of terrorist financing activities.
Research limitations/implications
The existing financial intelligence tools need to be repaired by removing the inherent limitations of the tools.
Practical implications
The financial intelligence units should take into cognizance the importance of early detection of terrorist financing activities for preventing terrorist attacks and need to redesign the existing tools in such a way that make these tools effective for early detection of terrorist financing activities.
Social implications
Peace will be established in society by preventing terrorist attacks through early detection of terrorist financing activities.
Originality/value
The originality of the paper lies in identifying the limitations of the existing financial intelligence tools for the early detection of terrorist financing activities.
Details
Keywords
To describe anticipatory risk as a fundamental pillar for a framework of international law in relation to global terrorism.
Abstract
Purpose
To describe anticipatory risk as a fundamental pillar for a framework of international law in relation to global terrorism.
Design/methodology/approach
Economic terrorism and global terrorist transactions are used as a case study to demonstrate asymmetric financial crime and vulnerabilities of financial districts, economies and populations.
Findings
The act of anticipation of risk is quantifiable and imposes a duty to manage foreseeable catastrophic consequences. Such a duty in turn creates a proportionate reaction that can be recognised in law.
Practical implications
Recommendations are made for international discussions by jurists, global agreements through the United Nations and the G8 and for national laws, corporate governance standards and regulatory measures to become a seamless extension of the international framework.
Originality/value
Commercial law, criminal law and the international laws and conventions of war require a framework that defines foreseeability, catastrophic risk, uncertainty, adequacy and proportionality.
Details
Keywords
This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up…
Abstract
Purpose
This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up with the criteria, which will make this tool an effective one in early detection of terrorist financing activities.
Design/methodology/approach
Considering the research aim, this research uses the funnelling method for identifying effectiveness criteria. Funnelling is a method of literature review that helps find pertinent literature by refining the search through filtering the available research (Ridley, 2008). Using this method, the researcher first applied the criteria of actionable intelligence to filter the financial intelligence tools to select the most promising and important tool (suspicious transaction reporting) for early detection of terrorist financing activities. The funnelling method was also applied to derive the effectiveness criteria from the operational features, and corresponding limitations, of the suspicious transaction reporting system. The funnelling method was also used to identify those operational features and limitations of suspicious transaction reporting that have the most direct relevance to the early detection problem of suspicious transaction reporting.
Findings
There are some operational features of STR that give rise to certain limitations that undermine its effectiveness in terms of early detection of terrorist financing activities. The limitations of STR necessitate a search for criteria that will make STR effective in early detection of terrorist financing activities. Based on the operational features and their corresponding limitations, effectiveness criteria for STR have been derived in this study. It is shown how these effectiveness criteria can remove the limitations of STR.
Research limitations/implications
The list of operational features and the corresponding limitations based on which the effectiveness criteria have been derived may not be exhaustive. There may have other operational features, and corresponding limitations that also make STR largely ineffective in the early detection of terrorist financing activities, and for which more effectiveness criteria should also be derived.
Practical implications
The limitations and the effectiveness criteria will pave the way for redesigning STR in such a way that will make it highly useful for detecting financing activities relating to imminent terrorist attacks.
Social implications
The society will experience fewer terrorist attacks that will make the society peaceful, happy and vibrant.
Originality/value
In this study, the effectiveness criteria of STR for early detection of terrorist financing activities have been derived in an innovative way by deducing them from the operational features of STR and the corresponding limitations.
Details
Keywords
Carina Boufford and Noëlle O'Connor
This chapter examines the role that strategic marketing plans play throughout the process of destination recovery post terrorist attack for the purpose of encouraging the return…
Abstract
This chapter examines the role that strategic marketing plans play throughout the process of destination recovery post terrorist attack for the purpose of encouraging the return of tourists. It investigates the impact that strategic marketing plans have as a part of crisis management applying a mixed-method approach which utilises survey data examining future industry leaders to quantify perspectives regarding the relationship between terrorism, tourism and destination marketing. Furthermore, this chapter reviews destination marketing techniques employed by international locations to determine recovery strategies utilising marketing plans. Bali, Paris, Northern Ireland, New York, Sri Lanka, Syria, Tunisia and Turkey were selected as case studies because they have been the focus of significant research studies to date (Asia-Pacific Economic Cooperation (APEC): BBC News, 2019; Ferreira, Graciano, Leal, & Costa, 2019) which have primarily focused on the relationship between terrorism and tourism regarding the collapse of the tourism industry. A survey was issued to gain perspectives regarding the relationship between terrorism, tourism and destination marketing. Second, case study analysis was conducted to examine both successful and unsuccessful destination recovery strategies. Results indicate that destinations that utilised strategic marketing as a part of crisis management frameworks experienced the return of tourists and recovered. This research contributed to the development of an inclusive, universal crisis management framework encompassing strategic marketing plans as a tool for recovery.
Details
Keywords
Fletcher N. Baldwin and Theresa A. DiPerna
This paper aims to explore complexities of compliance with international and customary law when faced with terrorist threats. The paper's thesis asserts that terrorism cannot be…
Abstract
Purpose
This paper aims to explore complexities of compliance with international and customary law when faced with terrorist threats. The paper's thesis asserts that terrorism cannot be successfully repelled unless the legitimacy of international and domestic law is adhered to by states out of a sense of reciprocal obligation in accordance with the principle of pacta sunt servanda (pacts shall be respected).
Design/methodology/approach
This paper examines US pronouncements in order to assess strategic validity.
Findings
While the Middle East, particularly Iraq, has been the focus of the US “War on terrorism,” the paper suggests two questions: what has been the US response to terrorist threats in the Americas? Have US national security priorities post‐9/11 been unnecessarily diverted from the Americas where much needed support is promised but lacking, and instead have resources been concentrated far beyond domestic and international norms?
Originality/value
The paper examines the US national security priorities, concluding that they have been unproductively diverted from the Americas to the Middle East in general and Iraq in particular. The US fixation upon Middle East “regime‐change”, while neglecting to recognize the dangerous nexus and presence of organized crime and terrorist organizations in the Americas, is illustrative of how the present administration has diverted its post.
Details
Keywords
Traditionally, terrorism risk has been priced based exclusively on the relationship between supply and demand in the insurance market, with no basis in actuarial principles. This…
Abstract
Traditionally, terrorism risk has been priced based exclusively on the relationship between supply and demand in the insurance market, with no basis in actuarial principles. This article discusses how the tragic events of September 11, 2001, have irrevocably changed the market for terrorism insurance, since terrorism has become a U.S. catastrophe risk. The author states that since insurers seek to quantify risk distributed over several months (versus a period of only a few days), quantitative assessment of terrorism risk may be achievable. The article proceeds to address the challenge of quantifying terrorism risk, and ultimately suggests that developing quantitative terrorism risk models may provide a foundation for securitizing and trading terrorism risk. The author introduces three examples of potential alternative risk transfer instruments for terrorism risk: 1) a catastrophe bond triggered by workers' compensation claims from extreme terrorism‐related events; 2) a catastrophe bond to cover life insurers from losses related to an attack employing a weapon of mass destruction; and 3) a contingent financing instrument triggered by a terrorism event whose natural buyers are financial short‐sellers.
The purpose of this paper is to illustrate how intelligent terrorist financiers avoid detection when acquiring and subsequently transferring financial assets to finance terrorism…
Abstract
Purpose
The purpose of this paper is to illustrate how intelligent terrorist financiers avoid detection when acquiring and subsequently transferring financial assets to finance terrorism. Particular emphasis is placed on cryptocurrency.
Design/methodology/approach
A qualitative content analysis of 30 semi-standardised expert interviews with both criminals and prevention experts led to the identification of means for the circumvention of current combat the financing of terrorism (CFT) measures with a focus on cryptocurrency.
Findings
The findings illustrate, for the benefit of law enforcement agencies, investigators, regulating authorities and legislators, the specific low-risk methods that terrorist financiers use to generate and transfer assets. These findings help to develop more effective prevention methods.
Research limitations/implications
Qualitative findings from the analysis of semi-standardised interviews are limited to the 30 interviewees’ perspectives.
Practical implications
Identification of gaps in existing CFT mechanisms provides compliance officers, law enforcement agencies and legislators with valuable insights into how criminals operate.
Originality/value
The existing literature focuses on organisations that combat terrorist financing and the improvement of CFT measures. This article outlines how terrorist financiers avoid detection. Both preventative and criminal perspectives are considered.
Details
Keywords
His death reignites debates about whether such targeted killings are effective in reducing the scale or impact of subsequent terrorist attacks.
Details
DOI: 10.1108/OXAN-DB213386
ISSN: 2633-304X
Keywords
Geographic
Topical
John D Blair, Myron D Fottler and Albert C Zapanta
This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist…
Abstract
This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist activity within the United States, and how these events have led to current situations. It also provides a model for health care leaders to follow when looking at a bioterrorist attack. The model includes descriptions of how the articles within this book relate to an overall bioterrorist formula. Through this, the reader shall be able to deduce which individual article fits into the vastness of healthcare research pertaining to bioterrorism.
This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak…
Abstract
Purpose
This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.
Methodology/approach
Review of relevant literature.
Findings
The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.
Research limitations/implications
Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.
Originality/value of the chapter
The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.
Details