Search results

1 – 10 of 198
Article
Publication date: 5 July 2013

Norman Mugarura

The purpose of the paper was to examine the challenges inherent in harnessing the UN and other AML counter‐measures, paying particular attention to the United Nations Resolutions…

1120

Abstract

Purpose

The purpose of the paper was to examine the challenges inherent in harnessing the UN and other AML counter‐measures, paying particular attention to the United Nations Resolutions on countering financing of terrorism and why the UN Security Resolutions have not been easy to invoke. As regards other AML counter‐measures, the paper examined the legal status of soft law instruments, articulating the possible reasons why they are easy to implement.

Design/methodology/approach

The paper was written by the analysis of UN and other AML counter‐measures – which were evaluated in the gaze of how they have been implemented across states. While states are under an obligation to implement UN AML counter‐measures such as international treaties and soft law instruments, private banks as non‐state actors have exploited some loopholes in the law to flaunt them. This has undermined the efficacy of global AML counter‐measures. Many banks have been fined for violating UN sanctions on countries like Iran and Sudan. These examples were utilized in appraising the current UN and other AML counter‐measures across states.

Findings

The findings of the paper were compelling in demonstrating that global anti‐money laundering laws are often emasculated by the fact that they are implemented in the realm of international law. International law manifests itself within independent member states' vested strategic self‐interests. In the event of conflicts, national self‐interests will prevail. But again, money laundering is an opportunistic crime because it generates both synergies and externalities and the response of individual states often depends on how it is affected by it. It is wrong to assume as doing things in the realm of international law is not as easy as it is presumed to be.

Research limitations/implications

It would have been better to carry out interviews so as to corroborate secondary data sources used in writing this paper. But due to some constraints, this option was not possible. It would also have been better to undertake the analysis of data based on a large sample of countries rather than cherry picking. While implementing AML counter‐measures in the realm of international law is necessary to foster international co‐operation, there are still some loopholes that need to be paid more attention.

Originality/value

The paper was written, analysed and evaluated based on the most recent literature on implementation of UN and other AML counter‐measures across countries. It also utilized the recent cases involving violations of UN AML counter‐measures by banks on sanctioned countries such as Iran and Sudan.

Details

Journal of Money Laundering Control, vol. 16 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 8 June 2021

Karen Renaud and Suzanne Prior

The purpose of this paper is to scope the field of child-related online harms and to produce a resource pack to communicate all the different dimensions of this domain to teachers…

Abstract

Purpose

The purpose of this paper is to scope the field of child-related online harms and to produce a resource pack to communicate all the different dimensions of this domain to teachers and carers.

Design/methodology/approach

With children increasingly operating as independent agents online, their teachers and carers need to understand the risks of their new playground and the range of risk management strategies they can deploy. Carers and teachers play a prominent role in applying the three M’s: mentoring the child, mitigating harms using a variety of technologies (where possible) and monitoring the child’s online activities to ensure their cybersecurity and cybersafety. In this space, the core concepts of “cybersafety” and “cybersecurity” are substantively different and this should be acknowledged for the full range of counter-measures to be appreciated. Evidence of core concept conflation emerged, confirming the need for a resource pack to improve comprehension. A carefully crafted resource pack was developed to convey knowledge of risky behaviors for three age groups and mapped to the appropriate “three M’s” to be used as counter-measures.

Findings

The investigation revealed key concept conflation, and then identified a wide range of harms and countermeasures. The resource pack brings clarity to this domain for all stakeholders.

Research limitations/implications

The number of people who were involved in the empirical investigation was limited to those living in Scotland and Nigeria, but it is unlikely that the situation is different elsewhere because the internet is global and children’s risky behaviors are likely to be similar across the globe.

Originality/value

Others have investigated this domain, but no one, to the authors’ knowledge, has come up with the “Three M’s” formulation and a visualization-based resource pack that can inform educators and carers in terms of actions they can take to address the harms.

Details

Information & Computer Security, vol. 29 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 6 July 2015

Hamed Tofangsaz

The purpose of this paper is to examine whether the counter-terrorism financing regime provides a solid platform for a better understanding of who should be considered terrorists…

1054

Abstract

Purpose

The purpose of this paper is to examine whether the counter-terrorism financing regime provides a solid platform for a better understanding of who should be considered terrorists or what forms terrorism, terrorist acts and terrorist groups, the financing of which is the subject matter. In the absence of an internationally agreed definition of terrorism, the question which needs to be posed is whether there is a clear and common understanding of what constitutes terrorism, terrorist acts and terrorist groups, the financing of which needs to be stopped. That is, from a criminal law perspective, whether the Terrorist Financing Convention, as the backbone of the counter-terrorist financing regime, clarifies what types of conduct, by who, in what circumstances and when, against whom (targets or victims) and with what intention or motivation should be considered terrorism?

Design/methodology/approach

It will be explained how and why it has been difficult to reach an agreement on the definition of terrorism. The endeavour of the drafters of the Terrorist Financing Convention and others involved in countering terrorist financing to establish a general definition of terrorism will be examined.

Findings

The record of attempts to define the elements of terrorism proves that it is hardly possible to reach an agreement on a generic definition of terrorism because the concept of terrorism is elusive and subject to various understandings. Even the definition provided by the Terrorist Financing Convention, is not convincing.

Originality/value

With regard to the findings, this paper calls for further research on the legal consequences of the implementation of the terrorist financing-counter measures, while the scope of terrorism, terrorist acts and terrorist organizations have been left vague.

Details

Journal of Financial Crime, vol. 22 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 7 January 2014

Norman Mugarura

It has become customary for states or regulatory domains to come together and evolve normative regimes to deal with overlapping exigencies such as money laundering. Over the past…

2217

Abstract

Purpose

It has become customary for states or regulatory domains to come together and evolve normative regimes to deal with overlapping exigencies such as money laundering. Over the past two decades, there has been a proliferation of global AML laws designed to foster international cooperation against money laundering and its predicate crimes. In this same vein, some states have adopted domestic AML laws designed with an ethos of extra-territorial dimension as a caution against the threats posed by money laundering crimes. The paper aims to critically examine CDD to tease out the possibility of harnessing it as a global AML paradigm.

Design/methodology/approach

The paper was written by critically examining primary and secondary data sources. In terms of primary data, the author has studied the relevant provision of different AML legislation such as BSA (1970), MLCA (1986), and PATRIOT (2001) Act in the USA; and FSMA (2000) and POCA (2002) in the UK. The author then evaluated these data in the context of the challenges of harnessing CDD across countries. In terms of secondary data sources, the author utilised data in academic text books, journal papers, electronic sources (web sites of AML agencies), and policy and research papers from specialist institutions such as FATF.

Findings

The findings corroborate the thesis that much as CDD is an important AML measure, it needs to be streamlined and implemented with care to apply across the board.

Research limitations/implications

The paper was written largely by way of library-based research. The author did not carry out interviews to corroborate some of the secondary data sources used in writing it. Carrying out interviews would have helped to minimise the potential for bias secondary data sources used was generated.

Practical implications

It is anticipated that this paper can be utilised to foster desired strategic and policy changes at a multiple institutional levels.

Originality/value

The paper is one of its kind to be written in its context. It will therefore make a viable contribution to the study of money counter-measures and how they are harnessed globally. It is therefore a must read!

Details

Journal of Money Laundering Control, vol. 17 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 9 September 2020

Peter C.Y. Chow

Applying a computable general equilibrium model to assess the impact of tariffs between the US and China, Taiwan stands to gain from trade diversion of the trade war between the…

Abstract

Applying a computable general equilibrium model to assess the impact of tariffs between the US and China, Taiwan stands to gain from trade diversion of the trade war between the two largest world economies in the short term.

Initially, Taiwan suffered a minor loss from the sector-specific tariff on steel and aluminum imposed by the US. However, its loss is mitigated after counting counter measures from foreign countries. The cumulated US tariffs and China's retaliations led to trade diversion effect. Taiwan's initial loss from the steel and aluminum tariffs was over compensated by a series of trade war between the US and China.

Under the scenario of the cumulated tariffs of $250 billion of US imports and China's retaliations of $110 billion on US goods, the social welfare, exports, import and trade balance in Taiwan increased. Its terms of trade improved as well. Real wage increases slightly more for unskilled labor than for skilled labor. The short-term effect of the trade war has positive effect on all macro indicators of Taiwan's economy.

On sectoral shift, Taiwan's export will gain the most in precision engineering products ($2,941.6 million), followed by electronics ($310.7 million) and agricultural products ($31.3 million). The negative effects are in sectors such as business services ($58.323 million), other services ($46.9 million), transportation service ($36.6 million), trade service ($25.3 million), and finance service ($24.5 million). Taiwan's total imports will increase by 0.59%, whereas its total export will increase by 0.33%. However, total trade balance still increases by $451.1 million.

The study also finds that Taiwan has a high degree of overlapping export commodities with China in the US market, much higher than most major trading partners for the US, yet its market share for those products in the US is ranged from 1% to 5% only. Moreover, more than 60% of Taiwan's export to the US is in intermediate goods which have less product differentiation than those in final consumption goods. These two factors will provide an opportunity for Taiwan to exploit the US market.

Though the short-term effect of trade war is positive, Taiwan needs to have a long-range planning amid the external shocks. Policy implications for Taiwan are to map out a cosmopolitan view of its geo-strategy by diversifying outward foreign direct investment and trade destinations. It needs to reduce the “systemic risk” of relying on single market in China which is vulnerable to the uncertainty in the US–China relations. If the trade war lasts too long, Taiwan would need to reevaluate its triangular trade-investment nexus with China and the US as well as its role in the global supply chain.

Details

Advances in Pacific Basin Business, Economics and Finance
Type: Book
ISBN: 978-1-83867-363-5

Keywords

Article
Publication date: 23 November 2012

Swapan Purkait

Phishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and…

5991

Abstract

Purpose

Phishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available phishing literatures and phishing countermeasures, to determine how research has evolved and advanced in terms of quantity, content and publication outlets. In addition to that, this paper aims to identify the important trends in phishing and its countermeasures and provides a view of the research gap that is still prevailing in this field of study.

Design/methodology/approach

This paper is a comprehensive literature review prepared after analysing 16 doctoral theses and 358 papers in this field of research. The papers were analyzed based on their research focus, empirical basis on phishing and proposed countermeasures.

Findings

The findings reveal that the current anti‐phishing approaches that have seen significant deployments over the internet can be classified into eight categories. Also, the different approaches proposed so far are all preventive in nature. A Phisher will mainly target the innocent consumers who happen to be the weakest link in the security chain and it was found through various usability studies that neither server‐side security indicators nor client‐side toolbars and warnings are successful in preventing vulnerable users from being deceived.

Originality/value

Educating the internet users about phishing, as well as the implementation and proper application of anti‐phishing measures, are critical steps in protecting the identities of online consumers against phishing attacks. Further research is required to evaluate the effectiveness of the available countermeasures against fresh phishing attacks. Also there is the need to find out the factors which influence internet user's ability to correctly identify phishing websites.

Details

Information Management & Computer Security, vol. 20 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 4 January 2011

Jasper Liao and Arabinda Acharya

As determined by the Financial Action Task Force, trade‐based money laundering (TBML) has become one of the three major money laundering methods used today. However, there has…

5249

Abstract

Purpose

As determined by the Financial Action Task Force, trade‐based money laundering (TBML) has become one of the three major money laundering methods used today. However, there has been very limited acknowledgment of the risk and counter‐measures against TBML until recently. This is particularly problematic with ever increasing trade volumes through transshipment and container shipping which is getting larger by the day. This paper aims to examine the role of TBML as a vehicle for terrorism financing and laundering proceeds of other criminal activity. It also examines the practice of transshipment, analyzes the challenges that this particular phenomenon poses to detection of TBML activity, and looks at possible alternative policy responses to mitigate additional money laundering risks.

Design/methodology/approach

This paper analyzes reports made by international organizations and government bodies, particularly, the US Government, dealing with various aspects of financial crime, import/export activity, and world trade statistics, in order to identify major challenges and possible solutions to the problem. Interviews were also conducted with the same goals.

Findings

Efforts to monitor and staunch the flow of illicit money through trade would be enhanced through more widespread coverage of customs cooperation and standardization of information sharing procedures between national customs agencies. Also, measures should be taken to make free trade areas more transparent to regulatory scrutiny.

Originality/value

This paper serves to expand the limited amount of scholarship on TBML and to suggest a policy approach towards detection of this kind of money laundering activity to policymakers.

Details

Journal of Money Laundering Control, vol. 14 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 July 2006

Roderic Broadhurst

Addresses the rapid expansion of computer connectivity and the opportunities provided for criminals to exploit security vulnerabilities in the online environment.

20411

Abstract

Purpose

Addresses the rapid expansion of computer connectivity and the opportunities provided for criminals to exploit security vulnerabilities in the online environment.

Design/methodology/approach

International efforts to combat cyber‐crime are reviewed by evaluating the forms of mutual legal assistance (MLA) now in place.

Findings

Cyber‐crime is often traditional crime (e.g. fraud, identify theft, child pornography) albeit executed swiftly and to vast numbers of potential victims, as well as unauthorised access, damage and interference to computer systems. Most detrimental are malicious and exploit codes that interrupt computer operations on a global scale and along with other cyber‐crimes threaten e‐commerce. The cross‐national nature of most computer‐related crimes have rendered many time‐honoured methods of policing both domestically and in cross‐border situations ineffective even in advanced nations, while the “digital divide” provides “safe havens” for cyber‐criminals. In response to the threat of cyber‐crime there is an urgent need to reform methods of MLA and to develop trans‐national policing capability.

Practical implications

The international response is briefly outlined in the context of the United Nations (UN) Transnational Organised Crime Convention (in force from September 2003) and the Council of Europe's innovative Cyber‐crime Convention (in force from July 2004). In addition, the role of the UN, Interpol, other institutions and bi‐lateral, regional and other efforts aimed a creating a seamless web of enforcement against cyber‐criminals are described.

Originality/value

The potential for potent global enforcement mechanisms are discussed.

Details

Policing: An International Journal of Police Strategies & Management, vol. 29 no. 3
Type: Research Article
ISSN: 1363-951X

Keywords

Book part
Publication date: 6 November 2018

Boris Ananyev, Bruno S. Sergi and Yan Vaslavskiy

This chapter considers anti-Russia sanctions and their role in the country’s sustainable development. The authors consider sanctions against Russia in the general context of…

Abstract

This chapter considers anti-Russia sanctions and their role in the country’s sustainable development. The authors consider sanctions against Russia in the general context of restrictive measures as an instrument of international economic activity. The nature of the anti-Russia sanctions is analyzed in the chapter. A chronology of the introduction of restrictive measures against Russia is discussed. The authors consistently examine the negative consequences and positive aspects of the anti-Russia sanctions in the general political and economic context. Due to duplicitous implications of the sanctions, attention is paid to the import phaseout policy, which has been proclaimed and implemented by Russia. In addition, reciprocal restrictive measures (counter-sanctions), which are introduced by Russia in response to the actions against the country, have been considered in the chapter. Regarding the Russian economy as an inherent part of the world economy, the authors present their conclusions on how reciprocal restrictive measures cause damage to the interests of all parties involved in the process.

Details

Exploring the Future of Russia’s Economy and Markets
Type: Book
ISBN: 978-1-78769-397-5

Keywords

Article
Publication date: 1 May 2007

Ahmad A. Abu‐Musa

This paper aims to examine the existence and adequacy of implemented computerized accounting information system (CAIS) security controls to prevent, detect and correct security…

1122

Abstract

Purpose

This paper aims to examine the existence and adequacy of implemented computerized accounting information system (CAIS) security controls to prevent, detect and correct security breaches in Saudi organization.

Design/methodology/approach

The first part of the paper introduces and discusses the literature review concerned with the CAIS security controls. The current paper introduces and discusses the main results of the empirical investigation. An empirical survey using self‐administered questionnaire, was carried out to achieve this purpose. A total of 500 questionnaires were distributed on a random sample of Saudi organizations. Of them, 275 valid, usable questionnaires were collected and analyzed.

Findings

The results of the study highlight a number of inadequately implemented CAIS security controls, and some suggestions and recommendations are introduced to strengthen the weak points and to close the loopholes in the present CAIS security controls in Saudi organizations.

Practical implications

From a practical standpoint, mangers, auditors, IT users and practitioners alike stand to gain from the findings of this study.

Originality/value

The results presented in the paper help enable managers, auditors, IT users and practitioners to better understand and secure their CAIS and to champion IT development for the success of their businesses.

Details

Information Management & Computer Security, vol. 15 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of 198