Search results
1 – 10 of over 1000Raluca Ioana Pascale, Calli Tzani, Maria Ioannou, Thomas James Vaughan Williams and Daniel Hunt
The purpose of this study is to investigate the psychological consequences of human trafficking and to reveal the importance of appropriate post-trafficking psychological…
Abstract
Purpose
The purpose of this study is to investigate the psychological consequences of human trafficking and to reveal the importance of appropriate post-trafficking psychological interventions. Specifically, this study provides a detailed analysis of human trafficking categories, as well as the characteristics of victims and traffickers’ motives. More recent data in the literature show that trauma-coerced attachments and complex post-traumatic stress disorder are also observed among trafficking survivors.
Design/methodology/approach
Each of the mentioned mental disorders is presented separately, and results are discussed throughout this study. Consequently, psychological interventions are proposed in accordance with the human trafficking category, survivors’ characteristics and needs and with the relevant personal risk factors determined among victims.
Findings
Sex trafficking can have a severe effect on a victim’s mental health, and mental health disorders are substantially higher in human trafficking victims compared to non-trafficked victims or general psychiatric population. Limitations, implications and future recommendations are discussed.
Originality/value
A limited number of past studies evaluated the mental health consequences and identified that survivors have a higher prevalence of anxiety disorders, depression disorders and post-traumatic stress disorder.
Details
Keywords
Sarah Adeyinka, Ine Lietaert and Ilse Derluyn
This paper aims to explore the role of family members in human trafficking and how their roles impact and are perceived by their children and wards.
Abstract
Purpose
This paper aims to explore the role of family members in human trafficking and how their roles impact and are perceived by their children and wards.
Design/methodology/approach
This paper uses data collected through a longitudinal, cross-country study. The study was conducted among 31 female, Nigerian victims of trafficking in Italy.
Findings
The authors argue that family members play important, howbeit diverse roles across space and time, in the different stages of the trafficking process, echoing a relational approach of their geographies.
Originality/value
This paper discusses the under-researched role of how family members may (wilfully or unknowingly) facilitate and aid the trafficking of their dependents and the consequences of their involvement on their children and wards.
Details
Keywords
Constantin Bratianu, Alexeis Garcia-Perez, Francesca Dal Mas and Denise Bedford
Madeleine Pullman, Lucy McCarthy and Carlos Mena
This pathway paper offers research guidance for investigating illegal supply chains as they increasingly threaten societies, economies and ecosystems. There are implications for…
Abstract
Purpose
This pathway paper offers research guidance for investigating illegal supply chains as they increasingly threaten societies, economies and ecosystems. There are implications for policy makers to consider incorporating supply chain expertise.
Design/methodology/approach
The authors’ work is informed by the team's previous and ongoing studies, research from fields such as criminology, investigative journalism and legal documents.
Findings
Illegality occurs in many supply chains and consists in multiple forms. Certain sectors, supply chain innovations, longer supply chains, and heterogeneous regulations and enforcement exacerbate illegal activities. But illegal activity may be necessary for humanitarian, religious or nationalistic reasons. These areas are under explored by supply chain researchers.
Research limitations/implications
By encouraging supply chain academics to research in this area as well as form collaborative partnerships outside of the discipline, the authors hope to move the field forward in prevention as well as learning from illegal supply chains.
Practical implications
Practitioners seek to prevent issues like counterfeiting with their products as well as fraud for economic and reputational reasons.
Social implications
Governments strive to minimise impacts on their economies and people, and both governments and NGOs attempt to minimise the negative social and environmental impacts. Policy makers need supply chain researchers to evaluate new laws to prevent enabling illegality in supply chains.
Originality/value
As an under-explored area, the authors suggest pathways such as partnering with other disciplines, exploring why these supply chains occur, considering other data sources and methodologies to interdict illegality and learning from illegal supply chains to improve legal supply chains.
Details
Keywords
In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core…
Abstract
Purpose
In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core practices of collecting, analysing and disseminating financial intelligence.
Design/methodology/approach
Because FIU practices are often secret and its transaction data classified as state secrets, the FIU’s daily operational activities remain obscure. Drawing on interviews, public reports and an online training course, this study encircles secrecy and offers a fine-grained analysis of the FIU's core activities.
Findings
The article finds that the FIU plays a pivotal role in financial surveillance because it can operate at various intersections. An FIU operates at the intersection of finance and security, in between the public and private sector and at the national and international domain. This pivotal role makes the FIU indispensable in the surveillance of payment systems and spending behavior.
Social implications
The article poses that the desirability and effectiveness of financial surveillance has to date not received sufficient consideration, while it affects (the privacy of) anyone with a bank account. The article asks: is it ethically justifiable that transaction information is declared suspect, investigated, and shared nationally and internationally, without the individual or entity concerned officially being notified and legally named a suspect?
Originality/value
This case-study is not only relevant for the study of finance/security, AML/CFT and financial surveillance, but also to policy makers and the broader public who merit an understanding of how their financial behaviour is being surveilled.
Details
Keywords
Vimal Raj L., Amilan S. and Aparna K.
This paper aims to develop and validate a cashless transaction adoption model (CTAM) that integrates all essential elements to investigate the adoption of “cashless transactions…
Abstract
Purpose
This paper aims to develop and validate a cashless transaction adoption model (CTAM) that integrates all essential elements to investigate the adoption of “cashless transactions (CLT)”.
Design/methodology/approach
The researchers surveyed 375 respondents from each of Bengaluru’s eight zones in India. In addition, using the respondents’ replies, a “partial least squares-based structural equation modelling (PLS-SEM)” technique was used to analyse the relationship between the components.
Findings
The results of CTAM reveal that 12 independent variables explain 84.7% of the variation in behavioural intention to adopt CLT. In addition, performance expectancy is the strongest predictor of users’ intentions to embrace CLT, followed by perceptions of the economy’s security and economic offence reduction, social influence, perceived trustworthiness, the expected level of effort and innovativeness. Furthermore, in terms of impediments, perceived risk and cost are the negative influence factors that affect behavioural intention to adopt CLT.
Originality/value
The research successfully developed and validated a comprehensive CTAM that integrates essential elements to investigate the adoption of CLT. Consequently, this research, for the first time, elucidates the precise role of “Perceived Economic Offense Reduction (PEOR)”, “Perceived Economic Benefit (PEB)” and “Perceived Economy’s Security (PES)” in influencing individuals’ behavioural intentions towards adopting CLT. Accordingly, this CTAM offers a more in-depth explanation than any other research for understanding why individuals embrace CLT systems.
Details
Keywords
Afzal Izzaz Zahari, Jamaliah Said, Kamarulnizam Abdullah and Norazam Mohd Noor
This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in…
Abstract
Purpose
This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in Malaysia.
Design/methodology/approach
The study used an open-ended question and focus group methods to gather information from 20 Malaysian enforcement officers with extensive experience in dealing with terrorism-related activities, as they strive to prevent and counter terrorism incidents. In addition, experienced practitioners and field experts also contributed to the study.
Findings
The study reveals various innovative financial methods used by terrorist-linked organisations to evade detection by local enforcement agencies. These findings are consistent with previous research, which highlights the intelligence of these organisations in avoiding detection by financial regulators.
Research limitations/implications
The findings are based on the perspectives of enforcement officers involved in preventing and countering terrorism activities. Further research could be conducted to gather insights from other government agencies, such as the judiciary or local agencies.
Practical implications
The study offers practical suggestions for organisations and institutions on effectively monitoring and taking appropriate actions in financial activities related to terrorism.
Originality/value
This study provides unique insights into the financial methods of terrorism-related organisations in an emerging country in Southeast Asia. Its findings can be applied throughout the region, given the country’s global connectivity. Furthermore, the study is distinctive in that it provides information from enforcement officers within terrorism-related government organisations, an area where resources are limited. The study also considers the impact of the pandemic on the development of these financial innovations by terrorist organisations.
Details
Keywords
Surajit Bag and Pavitra Dhamija
The International Labour Organization (ILO) has emphasized advancing decent employment in global supply chains. Supply chains (SC) are responsible for the growth of any economy…
Abstract
Purpose
The International Labour Organization (ILO) has emphasized advancing decent employment in global supply chains. Supply chains (SC) are responsible for the growth of any economy and are positively correlated with job creation. However, studies show that decent working conditions are becoming a major concern. Hence, this study is a modest attempt to examine the shortcomings that result in a lack of decent working conditions in global SCs' and further discuss what kind of guidelines, programs, policies, initiatives or principles are necessary to stimulate decent jobs and/or make it easier to enhance decent working conditions in SC.
Design/methodology/approach
The present paper first applied the systematic literature review and second used the TCM (Theory-Context-Methods), which is a framework-based review, further reporting the analysis of 59 journal research articles/papers listed in the Scopus database.
Findings
The most commonly used theories in the selected studies are institutional theory. As per these theories, governance, rules and regulations play a crucial role in stopping forced labour, child labour practices and social injustice among workers. The findings of this study comply with SDG eight, which states the significance of decent working conditions. Further, the topic modeling reveals four themes: (1) Nature of working conditions (2) Corporate legitimacy (3) Corporate governance mechanisms and (4) Corporate social responsibility, sustainability and ethics in firms. Lastly, we proposed a research framework that shows all the leading factors that influence working conditions in the supply chain.
Practical implications
Managers must focus on integrating decent working conditions in SC activities in their respective organizations and factories. Managers must realize and shoulder this responsibility with other top officials in the organization that improving the SC working conditions is the need of the hour. Consultation with Sustainable Development Goal (SDG) five (gender equality) (emphasize gender equality); and SDG eight (decent work and economic growth) (promote sustainable economic growth) is also recommended for managers. Lastly, managers need to develop suitable strategies keeping in mind the interplay between the leading factors (such as top management support, organizational culture, SA 8000 certification, occupational health and safety, stop forced labour and child labour practices, ethics training, enforce modern slavery act, global compliance regimes, buyer-supplier joint auditing, social responsible sourcing, stoppage of unauthorized sub-contracting, maintain SC transparency and CSR disclosure).
Originality/value
Using systematic literature review and TCM approach has provided some good takeaway points for managers. The study provides a valuable framework and fourteen research propositions which can be tested in the future.
Details
Keywords
Shreya Sangal, Gaurav Duggal and Achint Nigam
The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud…
Abstract
Purpose
The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud, money laundering, ransomware attacks, firearms, drug tracking, cyberattacks, identity theft and scams.
Design/methodology/approach
The authors conducted a review of studies related to illegal activities using blockchain from 2015 to 2023. Next, a thematic review of the literature was performed to see how these illegal activities were conducted using BCT.
Findings
Through this study, the authors identify the relevant themes that highlight the major illegal activities performed using BCT, its possible steps for prevention and the opportunities for future developments. Finally, the authors provide suggestions for future research using the theory, context and method framework.
Originality/value
No other research has synthesized the illegal activities using BCT through a thematic approach to the best of the authors’ knowledge. Hence, this study will act as a starting point for future research for academic and technical practitioners in this area.
Details
Keywords
This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money…
Abstract
Purpose
This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money laundering regimes of the UK and the USA.
Design/methodology/approach
The research draws upon the following sources. Firstly, statistics provided by the UK National Crime Agency, 2019 (NCA) regarding suspicious activity report (SAR) filing rates. Secondly, anti-money laundering legislation in the USA and UK. Thirdly, statements made in the political domain in the USA, particularly those which raised constitutional concerns during the progress of the Patriot Act 2001. Finally, statements and recommendations by a UK Parliamentary Commission enquiring into the effectiveness of the suspicious activity reporting regime.
Findings
The UK reporting regime does not accommodate professional judgement, resulting in the filing of SARs with limited intelligence value. This contrasts with discretionary reporting in the USA: voluntary reporting guides and influences auditor behaviour rather than mandating it. Defensive filing by UK auditors (defence to anti-money launderings [DAMLs]) has increased in recent years but the number of SARs filed has declined.
Originality/value
The study evaluates auditor behavioural responses to legislative regimes which mandate or alternatively accommodate discretion in the reporting suspicion of money laundering. Consideration of constitutional and judicial activism in this context is a novel contribution to the literature. For its theoretical framework the study uses Foucault’s concept of discipline of the self to evaluate auditor behaviour under both regimes.
Details