Search results

1 – 5 of 5
Book part
Publication date: 2 May 2024

Amanuel Elias

Research indicates a long historical connection between racism and nationalist ideologies. This connection has been highlighted in the resurgence of exclusionary nationalism in…

Abstract

Research indicates a long historical connection between racism and nationalist ideologies. This connection has been highlighted in the resurgence of exclusionary nationalism in recent years, across many multicultural societies. This chapter discusses the notions of race, ethnicity and nation, and critically examines how racism shapes contemporary manifestations of nationalist discourse across the world. It explores the historical role of settler-colonialism, imperial expansions and the capitalist development in shaping the racial/ethnic aspect of nationalist development. Moreover, it provides an analysis of the interconnections between the racialisation of minorities, exclusionary ideologies and the consolidation of ethno-nationalist tropes. This chapter further considers the impact of demographic changes in reinforcing anti-migrant exclusionary sentiments. This is examined in connection with emerging nativist discourse, exploring how xenophobic racism has shaped and is shaped by nostalgic nationalism based on the sanitisation of the legacies of Empire and colonialism.

Details

Racism and Anti-Racism Today
Type: Book
ISBN: 978-1-83753-512-5

Keywords

Article
Publication date: 25 May 2023

Md Noor Uddin Milon and Habib Zafarullah

Money laundering (ML) is a major criminal offence stemming from unethical practices by personnel on the ground at Chattogram Port, an important import and export facility in…

Abstract

Purpose

Money laundering (ML) is a major criminal offence stemming from unethical practices by personnel on the ground at Chattogram Port, an important import and export facility in Bangladesh. Because money can be more easily laundered through imports, it is necessary to investigate the dubious process in this sector. This study aims to identify the items most regularly used for easy ML and the factors contributing to their vulnerability.

Design/methodology/approach

This research uses a qualitative approach and analyses information from primary sources. Data is obtained from customs officials, port authority personnel, importers and customs brokers through semi-structured questionnaires. Although there are many techniques for ML, this study only found three most overwhelming: under-invoicing, over-invoicing and misdeclaration. A few case studies have been used based on newspaper reports and the internet to triangulate the qualitative data.

Findings

Four import items – food products, garments, capital machinery and chemicals – have a higher risk of ML. This study also revealed that money launderers prefer under-invoicing food and garment items. Misdeclaration is more commonly associated with capital machinery and chemical items. Over-invoicing, on the other hand, is only prevalent in government purchases. The port authorities need to pay particular attention to these issues.

Research limitations/implications

As ML is an ongoing activity that changes over time, the findings of this research are circumscribed by the data collected at a single point in time. Additionally, this research did not consider alternative laundering methods.

Practical implications

The research results can provide a basis for creating effective anti-money laundering (AML) strategies to assist with sustainable economic growth.

Social implications

Developing effective AML measures can help combat corruption and establish good governance in the country and support human well-being.

Originality/value

This paper presents original research findings based on technical analysis. The Chattogram Port Authority and the National Board of Revenue have accepted and used the main findings in a collaborative action plan to tackle ML. The Bangladesh Bank, the country’s central bank, has also incorporated the necessary guidelines and regulations into the Money Laundering Prevention Act, 2012.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 2 May 2024

Amanuel Elias

Racism occurs in many ways and varies across countries, evolving and adapting to sociocultural history, as well as contemporary economic, political and technological changes. This…

Abstract

Racism occurs in many ways and varies across countries, evolving and adapting to sociocultural history, as well as contemporary economic, political and technological changes. This chapter discusses the multilevel dimensions of racism and its diverse manifestations across multiracial societies. It examines how different aspects of racism are mediated interpersonally, and embedded in institutions, social structures and processes, that produce and sustain racial inequities in power, resources and lived experiences. Furthermore, this chapter explores the direct and indirect ways racism is expressed in online and offline platforms and details its impacts on various groups based on their intersecting social and cultural identities. Targets of racism are those who primarily bear the adverse effects. However, racism also affects its perpetrators in many ways, including by limiting their social relations and attachments, and by imposing social and economic costs. This chapter thus analyses the many aspects of racism both from targets and perpetrators' perspectives.

Details

Racism and Anti-Racism Today
Type: Book
ISBN: 978-1-83753-512-5

Keywords

Book part
Publication date: 2 May 2024

Amanuel Elias

This concluding chapter summarises the main themes and topics discussed in this book, synthesising the key issues facing contemporary anti-racism efforts. It reflects on a…

Abstract

This concluding chapter summarises the main themes and topics discussed in this book, synthesising the key issues facing contemporary anti-racism efforts. It reflects on a possible anti-racist future(s) in a context of greater sociocultural affiliations and more interconnected local and global environments. Ideas about race and ethnicity have adapted, and racial hierarchies, structures and processes continuously shape the way social groups engage, interact and live with difference. This raises questions regarding the enduring influence of race and racism. What will the state of multiracial societies be in the evolving digital economy that has transformed the structural and institutional environment affecting everyday life? What kind of an anti-racist future can be imagined that will contribute to ensuring greater social equity? This chapter ponders on a range of possibilities to chart directions towards an anti-racist future that fosters increased intercultural understanding for relational engagements across difference. It draws conclusions and lessons for an anti-racist future and lays out some directions for future research.

Details

Racism and Anti-Racism Today
Type: Book
ISBN: 978-1-83753-512-5

Keywords

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 5 of 5