Search results

1 – 10 of over 1000
Article
Publication date: 7 April 2023

Raluca Ioana Pascale, Calli Tzani, Maria Ioannou, Thomas James Vaughan Williams and Daniel Hunt

The purpose of this study is to investigate the psychological consequences of human trafficking and to reveal the importance of appropriate post-trafficking psychological…

Abstract

Purpose

The purpose of this study is to investigate the psychological consequences of human trafficking and to reveal the importance of appropriate post-trafficking psychological interventions. Specifically, this study provides a detailed analysis of human trafficking categories, as well as the characteristics of victims and traffickers’ motives. More recent data in the literature show that trauma-coerced attachments and complex post-traumatic stress disorder are also observed among trafficking survivors.

Design/methodology/approach

Each of the mentioned mental disorders is presented separately, and results are discussed throughout this study. Consequently, psychological interventions are proposed in accordance with the human trafficking category, survivors’ characteristics and needs and with the relevant personal risk factors determined among victims.

Findings

Sex trafficking can have a severe effect on a victim’s mental health, and mental health disorders are substantially higher in human trafficking victims compared to non-trafficked victims or general psychiatric population. Limitations, implications and future recommendations are discussed.

Originality/value

A limited number of past studies evaluated the mental health consequences and identified that survivors have a higher prevalence of anxiety disorders, depression disorders and post-traumatic stress disorder.

Details

Mental Health and Social Inclusion, vol. 28 no. 2
Type: Research Article
ISSN: 2042-8308

Keywords

Article
Publication date: 21 July 2023

Sarah Adeyinka, Ine Lietaert and Ilse Derluyn

This paper aims to explore the role of family members in human trafficking and how their roles impact and are perceived by their children and wards.

Abstract

Purpose

This paper aims to explore the role of family members in human trafficking and how their roles impact and are perceived by their children and wards.

Design/methodology/approach

This paper uses data collected through a longitudinal, cross-country study. The study was conducted among 31 female, Nigerian victims of trafficking in Italy.

Findings

The authors argue that family members play important, howbeit diverse roles across space and time, in the different stages of the trafficking process, echoing a relational approach of their geographies.

Originality/value

This paper discusses the under-researched role of how family members may (wilfully or unknowingly) facilitate and aid the trafficking of their dependents and the consequences of their involvement on their children and wards.

Details

International Journal of Migration, Health and Social Care, vol. 19 no. 3/4
Type: Research Article
ISSN: 1747-9894

Keywords

Article
Publication date: 16 June 2023

Madeleine Pullman, Lucy McCarthy and Carlos Mena

This pathway paper offers research guidance for investigating illegal supply chains as they increasingly threaten societies, economies and ecosystems. There are implications for…

Abstract

Purpose

This pathway paper offers research guidance for investigating illegal supply chains as they increasingly threaten societies, economies and ecosystems. There are implications for policy makers to consider incorporating supply chain expertise.

Design/methodology/approach

The authors’ work is informed by the team's previous and ongoing studies, research from fields such as criminology, investigative journalism and legal documents.

Findings

Illegality occurs in many supply chains and consists in multiple forms. Certain sectors, supply chain innovations, longer supply chains, and heterogeneous regulations and enforcement exacerbate illegal activities. But illegal activity may be necessary for humanitarian, religious or nationalistic reasons. These areas are under explored by supply chain researchers.

Research limitations/implications

By encouraging supply chain academics to research in this area as well as form collaborative partnerships outside of the discipline, the authors hope to move the field forward in prevention as well as learning from illegal supply chains.

Practical implications

Practitioners seek to prevent issues like counterfeiting with their products as well as fraud for economic and reputational reasons.

Social implications

Governments strive to minimise impacts on their economies and people, and both governments and NGOs attempt to minimise the negative social and environmental impacts. Policy makers need supply chain researchers to evaluate new laws to prevent enabling illegality in supply chains.

Originality/value

As an under-explored area, the authors suggest pathways such as partnering with other disciplines, exploring why these supply chains occur, considering other data sources and methodologies to interdict illegality and learning from illegal supply chains to improve legal supply chains.

Details

International Journal of Operations & Production Management, vol. 44 no. 1
Type: Research Article
ISSN: 0144-3577

Keywords

Open Access
Article
Publication date: 6 December 2022

Pieter Lagerwaard

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core…

1978

Abstract

Purpose

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core practices of collecting, analysing and disseminating financial intelligence.

Design/methodology/approach

Because FIU practices are often secret and its transaction data classified as state secrets, the FIU’s daily operational activities remain obscure. Drawing on interviews, public reports and an online training course, this study encircles secrecy and offers a fine-grained analysis of the FIU's core activities.

Findings

The article finds that the FIU plays a pivotal role in financial surveillance because it can operate at various intersections. An FIU operates at the intersection of finance and security, in between the public and private sector and at the national and international domain. This pivotal role makes the FIU indispensable in the surveillance of payment systems and spending behavior.

Social implications

The article poses that the desirability and effectiveness of financial surveillance has to date not received sufficient consideration, while it affects (the privacy of) anyone with a bank account. The article asks: is it ethically justifiable that transaction information is declared suspect, investigated, and shared nationally and internationally, without the individual or entity concerned officially being notified and legally named a suspect?

Originality/value

This case-study is not only relevant for the study of finance/security, AML/CFT and financial surveillance, but also to policy makers and the broader public who merit an understanding of how their financial behaviour is being surveilled.

Details

Journal of Money Laundering Control, vol. 26 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 11 December 2023

Vimal Raj L., Amilan S. and Aparna K.

This paper aims to develop and validate a cashless transaction adoption model (CTAM) that integrates all essential elements to investigate the adoption of “cashless transactions…

Abstract

Purpose

This paper aims to develop and validate a cashless transaction adoption model (CTAM) that integrates all essential elements to investigate the adoption of “cashless transactions (CLT)”.

Design/methodology/approach

The researchers surveyed 375 respondents from each of Bengaluru’s eight zones in India. In addition, using the respondents’ replies, a “partial least squares-based structural equation modelling (PLS-SEM)” technique was used to analyse the relationship between the components.

Findings

The results of CTAM reveal that 12 independent variables explain 84.7% of the variation in behavioural intention to adopt CLT. In addition, performance expectancy is the strongest predictor of users’ intentions to embrace CLT, followed by perceptions of the economy’s security and economic offence reduction, social influence, perceived trustworthiness, the expected level of effort and innovativeness. Furthermore, in terms of impediments, perceived risk and cost are the negative influence factors that affect behavioural intention to adopt CLT.

Originality/value

The research successfully developed and validated a comprehensive CTAM that integrates essential elements to investigate the adoption of CLT. Consequently, this research, for the first time, elucidates the precise role of “Perceived Economic Offense Reduction (PEOR)”, “Perceived Economic Benefit (PEB)” and “Perceived Economy’s Security (PES)” in influencing individuals’ behavioural intentions towards adopting CLT. Accordingly, this CTAM offers a more in-depth explanation than any other research for understanding why individuals embrace CLT systems.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 21 November 2023

Afzal Izzaz Zahari, Jamaliah Said, Kamarulnizam Abdullah and Norazam Mohd Noor

This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in…

Abstract

Purpose

This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in Malaysia.

Design/methodology/approach

The study used an open-ended question and focus group methods to gather information from 20 Malaysian enforcement officers with extensive experience in dealing with terrorism-related activities, as they strive to prevent and counter terrorism incidents. In addition, experienced practitioners and field experts also contributed to the study.

Findings

The study reveals various innovative financial methods used by terrorist-linked organisations to evade detection by local enforcement agencies. These findings are consistent with previous research, which highlights the intelligence of these organisations in avoiding detection by financial regulators.

Research limitations/implications

The findings are based on the perspectives of enforcement officers involved in preventing and countering terrorism activities. Further research could be conducted to gather insights from other government agencies, such as the judiciary or local agencies.

Practical implications

The study offers practical suggestions for organisations and institutions on effectively monitoring and taking appropriate actions in financial activities related to terrorism.

Originality/value

This study provides unique insights into the financial methods of terrorism-related organisations in an emerging country in Southeast Asia. Its findings can be applied throughout the region, given the country’s global connectivity. Furthermore, the study is distinctive in that it provides information from enforcement officers within terrorism-related government organisations, an area where resources are limited. The study also considers the impact of the pandemic on the development of these financial innovations by terrorist organisations.

Details

Journal of Criminological Research, Policy and Practice, vol. 10 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 22 December 2022

Surajit Bag and Pavitra Dhamija

The International Labour Organization (ILO) has emphasized advancing decent employment in global supply chains. Supply chains (SC) are responsible for the growth of any economy…

Abstract

Purpose

The International Labour Organization (ILO) has emphasized advancing decent employment in global supply chains. Supply chains (SC) are responsible for the growth of any economy and are positively correlated with job creation. However, studies show that decent working conditions are becoming a major concern. Hence, this study is a modest attempt to examine the shortcomings that result in a lack of decent working conditions in global SCs' and further discuss what kind of guidelines, programs, policies, initiatives or principles are necessary to stimulate decent jobs and/or make it easier to enhance decent working conditions in SC.

Design/methodology/approach

The present paper first applied the systematic literature review and second used the TCM (Theory-Context-Methods), which is a framework-based review, further reporting the analysis of 59 journal research articles/papers listed in the Scopus database.

Findings

The most commonly used theories in the selected studies are institutional theory. As per these theories, governance, rules and regulations play a crucial role in stopping forced labour, child labour practices and social injustice among workers. The findings of this study comply with SDG eight, which states the significance of decent working conditions. Further, the topic modeling reveals four themes: (1) Nature of working conditions (2) Corporate legitimacy (3) Corporate governance mechanisms and (4) Corporate social responsibility, sustainability and ethics in firms. Lastly, we proposed a research framework that shows all the leading factors that influence working conditions in the supply chain.

Practical implications

Managers must focus on integrating decent working conditions in SC activities in their respective organizations and factories. Managers must realize and shoulder this responsibility with other top officials in the organization that improving the SC working conditions is the need of the hour. Consultation with Sustainable Development Goal (SDG) five (gender equality) (emphasize gender equality); and SDG eight (decent work and economic growth) (promote sustainable economic growth) is also recommended for managers. Lastly, managers need to develop suitable strategies keeping in mind the interplay between the leading factors (such as top management support, organizational culture, SA 8000 certification, occupational health and safety, stop forced labour and child labour practices, ethics training, enforce modern slavery act, global compliance regimes, buyer-supplier joint auditing, social responsible sourcing, stoppage of unauthorized sub-contracting, maintain SC transparency and CSR disclosure).

Originality/value

Using systematic literature review and TCM approach has provided some good takeaway points for managers. The study provides a valuable framework and fourteen research propositions which can be tested in the future.

Article
Publication date: 23 January 2024

Shreya Sangal, Gaurav Duggal and Achint Nigam

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud…

Abstract

Purpose

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud, money laundering, ransomware attacks, firearms, drug tracking, cyberattacks, identity theft and scams.

Design/methodology/approach

The authors conducted a review of studies related to illegal activities using blockchain from 2015 to 2023. Next, a thematic review of the literature was performed to see how these illegal activities were conducted using BCT.

Findings

Through this study, the authors identify the relevant themes that highlight the major illegal activities performed using BCT, its possible steps for prevention and the opportunities for future developments. Finally, the authors provide suggestions for future research using the theory, context and method framework.

Originality/value

No other research has synthesized the illegal activities using BCT through a thematic approach to the best of the authors’ knowledge. Hence, this study will act as a starting point for future research for academic and technical practitioners in this area.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 6 November 2023

Simon D. Norton

This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money…

Abstract

Purpose

This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money laundering regimes of the UK and the USA.

Design/methodology/approach

The research draws upon the following sources. Firstly, statistics provided by the UK National Crime Agency, 2019 (NCA) regarding suspicious activity report (SAR) filing rates. Secondly, anti-money laundering legislation in the USA and UK. Thirdly, statements made in the political domain in the USA, particularly those which raised constitutional concerns during the progress of the Patriot Act 2001. Finally, statements and recommendations by a UK Parliamentary Commission enquiring into the effectiveness of the suspicious activity reporting regime.

Findings

The UK reporting regime does not accommodate professional judgement, resulting in the filing of SARs with limited intelligence value. This contrasts with discretionary reporting in the USA: voluntary reporting guides and influences auditor behaviour rather than mandating it. Defensive filing by UK auditors (defence to anti-money launderings [DAMLs]) has increased in recent years but the number of SARs filed has declined.

Originality/value

The study evaluates auditor behavioural responses to legislative regimes which mandate or alternatively accommodate discretion in the reporting suspicion of money laundering. Consideration of constitutional and judicial activism in this context is a novel contribution to the literature. For its theoretical framework the study uses Foucault’s concept of discipline of the self to evaluate auditor behaviour under both regimes.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

1 – 10 of over 1000