Search results

1 – 10 of 40
Open Access
Article
Publication date: 28 March 2020

Paola Maggio

This study aims to critically analyse the Law 9 January 2019, n. 3, on “Measures to fight crimes against the public administration and on the transparency of political parties and…

3275

Abstract

Purpose

This study aims to critically analyse the Law 9 January 2019, n. 3, on “Measures to fight crimes against the public administration and on the transparency of political parties and movements” (so-called bribe-destroyer law).

Design/methodology/approach

This paper draws on reports, legal scholarship and other open-source data to examine a legislative innovation for the corruption in Italy in relation to the general guarantees of the trial process and with the controversial paradigm of the national perception index of bribery.

Findings

The Italian legislative initiative that will be examined is innovative in nature and goes beyond the constitutional and conventional principles on procedural guarantees. The new initiative needs to be integrated into the international and European action against bribery that targets criminal proceeds, and at the same time, be anchored in respect for human rights during the process.

Research limitations/implications

The new initiative needs to be integrated into the international and European action against bribery that targets criminal proceeds, and at the same time, be anchored in respect for human rights during the process.

Practical implications

Despite the aggressiveness and lofty proclamations by those who aspire to fight corruption from the highest levels, the goal of rehabilitating Italy from one of the seven “deadly sins” that delay economic growth still seems far off.

Social implications

In the absence of public ethics, the increase in criminalisation does not seem sufficient on its own to guarantee the containment of the phenomenon.

Originality/value

This study examines the strengths and weaknesses of the important new law, its compatibility with human rights standards and its relationship to international standards of anti-bribery policies. The aggressive legislation critically relies on the pervasive and persistent lack of perception of corruption as a crime. In the confiscation (and now also reparation) of equivalent that normally addresses assets accumulated in a lawful manner, the periculum is even presumed in re ipsa and the classical aims of caution undergo a total torsion revealing an authoritarian face that takes on the meaning of anticipating further sanctioning contents. Finally, the presence of many levels of sanctioning in relation to the same fact poses serious problems of violation of the ne bis in idem rule.

Details

Journal of Financial Crime, vol. 28 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 27 May 2021

Olusola Joshua Olujobi

The aim of this study is to investigate how Nigeria can seek legal assistance on recovery of its stolen assets to reduce corruption and to ensure no sheltered havens for incomes…

2010

Abstract

Purpose

The aim of this study is to investigate how Nigeria can seek legal assistance on recovery of its stolen assets to reduce corruption and to ensure no sheltered havens for incomes from corruption.

Design/methodology/approach

The research adopts a conceptual method by using existing literature with the application of doctrinal legal research technique. The research likewise uses primary and secondary sources of legislations such as legislative provisions, case laws and the provisions of Chapter V of the United Nations Convention against Corruption and the process of asset recovery. The study compares the United Kingdom, USA, Hong Kong in China, South Africa and Nigeria proceeds of corruption recovery laws to gain basic legal features that would be beneficial to Nigeria in reforming its anti-corruption laws.

Findings

The principle of territorial sovereignty under the international law makes the offence of corruption not punishable outside the jurisdiction of the state where the offence was committed. As a result, some developed states boost their economy with these proceeds and the developing states are impoverished. There is also an allegation of discrepancies in the figures of funds recovered by the anti-corruption agencies. Thus, there is the need for transparency; law on civil forfeiture of proceeds of corruption; bilateral treaties; and mutual legal assistance on investigation, confiscation among countries for tracing and returning of proceeds of corruption.

Research limitations/implications

The estimates of the volume of assets looted from Nigeria vary widely because of the complexity of collecting data on proceeds of corruption as official statistics on proceeds of corruption recovered do not exist as each anti-corruption agency occasionally makes pronouncements on the volume of assets recovered without any breakdown in terms of assets seized, nature of assets and their locations and its values. Such data would aid policymakers to measure the effectiveness of the present assets legislations and to enhance its effectiveness.

Practical implications

Considering the clandestine manners corruption is being committed, it is tasking to correctly evaluate the amount of money stolen so, their economic impacts on the nation’s economy.

Social implications

Absence of accurate data would aid policymakers to measure the effectiveness of the present assets legislations and to enhance its effectiveness.

Originality/value

The study offers modules on management of proceeds of corruption by establishing “Assets Management Commission” and “Proceeds of Corruption Forfeiture Funds” for reparation of victims’ of corruption. The study suggests the necessity for civil forfeiture of proceeds of corruption, which is presently lacking, and creation of Proceeds of Corruption Recovery and Management Commission to manage such proceeds and advocate establishment of “Proceeds of Corruption Forfeiture Funds” for reparation of victims of corruption.

Details

Journal of Money Laundering Control, vol. 24 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 28 November 2023

Qian Qin

This research explores the intricate dynamics of national interests realised through Japan's official development assistance (ODA) to China. It aims to deepen the understanding of…

Abstract

Purpose

This research explores the intricate dynamics of national interests realised through Japan's official development assistance (ODA) to China. It aims to deepen the understanding of these mechanisms, detailing the extent to which Japan has accomplished its national interests.

Design/methodology/approach

The paper applies the role theory and narrative analysis to elucidate Japan's national role conception and its categories of national interests with regards to its ODA policy. It utilises both qualitative and quantitative methods to examine the success rate in achieving Japan's diplomatic objectives and how those interests have manifested over time.

Findings

The findings suggest a mixed outcome. Whilst Japan's ODA to China has helped in expanding trade and fostering mutual understanding and cooperation, it has been less successful in promoting democratic governance in China or effectively counterbalancing China's regional power. Hence, the realisation of national interests through ODA is a complex process contingent upon numerous factors.

Originality/value

This study stands out for its multifaceted approach in examining Japan's ODA policy towards China, integrating both quantitative and qualitative methodologies and applying the role theory in the context of international development aid. It fills a significant gap in the literature by analysing the interplay between national interests and foreign aid, providing nuanced insights into the successes and challenges of Japan's pursuit of its diplomatic objectives. The study's findings have important implications for understanding the complexity of international aid dynamics and can inform future policy decisions in the realm of international relations and foreign aid.

Details

International Trade, Politics and Development, vol. 8 no. 1
Type: Research Article
ISSN: 2586-3932

Keywords

Open Access
Article
Publication date: 21 September 2017

Bayes Ahmed

“No climate change, no climate refugees”. On the basis of this theme, this paper aims to propose a method for undertaking the responsibility for climate refugees literally…

50543

Abstract

Purpose

“No climate change, no climate refugees”. On the basis of this theme, this paper aims to propose a method for undertaking the responsibility for climate refugees literally uprooted by liable climate polluting countries. It also considers the historical past, culture, geopolitics, imposed wars, economic oppression and fragile governance to understand the holistic scenario of vulnerability to climate change.

Design/methodology/approach

This paper is organized around three distinct aspects of dealing with extreme climatic events – vulnerability as part of making the preparedness and response process fragile (past), climate change as a hazard driver (present) and rehabilitating the climate refugees (future). Bangladesh is used as an example that represents a top victim country to climatic extreme events from many countries with similar baseline characteristics. The top 20 countries accounting for approximately 82 per cent of the total global carbon dioxide (CO2) emissions are considered for model development by analysing the parameters – per capita CO2 emissions, ecological footprint, gross national income and human development index.

Findings

Results suggest that under present circumstances, Australia and the USA each should take responsibility of 10 per cent each of the overall global share of climate refugees, followed by Canada and Saudi Arabia (9 per cent each), South Korea (7 per cent) and Russia, Germany and Japan (6 per cent each). As there is no international convention for protecting climate refugees yet, the victims either end up in detention camps or are refused shelter in safer places or countries. There is a dire need to address the climate refugee crisis as these people face greater political risks.

Originality/value

This paper provides a critical overview of accommodating the climate refugees (those who have no means for bouncing back) by the liable countries. It proposes an innovative method by considering the status of climate pollution, resource consumption, economy and human development rankings to address the problem by bringing humanitarian justice to the ultimate climate refugees.

Details

International Journal of Climate Change Strategies and Management, vol. 10 no. 1
Type: Research Article
ISSN: 1756-8692

Keywords

Open Access
Article
Publication date: 15 March 2019

Wolfgang J. Weitzl

This paper aims to demonstrate that online complainants’ reactions to a company’s service recovery attempts (webcare) can significantly vary across two different types of…

2990

Abstract

Purpose

This paper aims to demonstrate that online complainants’ reactions to a company’s service recovery attempts (webcare) can significantly vary across two different types of dissatisfied customers (“vindictives” vs “constructives”), who have dramatically diverging complaint goal orientations.

Design/methodology/approach

Online multi-country survey among 812 adult consumers who recently had a dissatisfying brand experience and turned to a marketer-generated social media site to voice an online complaint for achieving their ultimate complaining goals. Scenario-based online experiment for cross-validating the survey findings.

Findings

Results suggest that “vindictive complainants” – driven dominantly by brand-adverse motives – are immune to any form of webcare, while “constructive complainants” – interested in restoring the customer-brand relationship – react more sensitively. For the latter, “no-responses” often trigger detrimental brand-related reactions (e.g. unfavorable brand image), whereas “defensive responses” are likely to stimulate post-webcare negative word-of-mouth.

Research limitations/implications

This research identifies the gains and harms of (un-)desired webcare. By doing so, it not only sheds light on the circumstances when marketers have to fear negative effects (e.g. negative word-of-mouth) but also provides insights into the conditions when such effects are unlikely. While the findings of the cross-sectional survey are validated with an online experiment, findings should be interpreted with care as other complaining contexts should be further investigated.

Practical implications

Marketers have to expect a serious “backfiring effect” from an unexpected source, namely, consumers who were initially benevolent toward the involved brand but who received an inappropriate response.

Originality/value

This research is one of the first research studies that enables marketers to identify situations when webcare is likely to backfire on the brand after a service failure.

Details

Journal of Product & Brand Management, vol. 28 no. 3
Type: Research Article
ISSN: 1061-0421

Keywords

Open Access
Article
Publication date: 31 August 2022

Zelin Tong, Jingdan Feng and Fang Liu

Studies have shown that negative publicity adversely affects brand trust, but exactly how brand trust can be damaged remains poorly understood. This study aims to explore how…

4932

Abstract

Purpose

Studies have shown that negative publicity adversely affects brand trust, but exactly how brand trust can be damaged remains poorly understood. This study aims to explore how negative publicity influences image congruity and, subsequently, brand trust. In addition, the study also examined the effectiveness of two corporate strategies to repair both congruity and trust.

Design/methodology/approach

Based on a valid sample of 522 Chinese consumers between the ages 20 and 50, this study adopted a quasi-experimental design involving two types of negative publicity (performance- and value-related) and two initial corporate repair strategies (compensation and public apology) intended to repair brand trust.

Findings

Negative publicity shaped brand trust through both functional congruity and self-congruity. Moreover, the type of negative publicity affected the role of image congruity in brand trust. The effectiveness of repair strategies further depended on the type of negative publicity.

Research limitations/implications

Mobile phones were an appropriate focal product for this research, but examining only one product category may limit findings’ generalizability. Negative emotions such as frustration or anger and their relationships with congruity can also be addressed in future work. Subsequent research can additionally consider more conditions to explore alternative routes of processing related to brand trust.

Practical implications

Brand trust is a vulnerable brand asset on which negative publicity can have seriously negative consequences. Marketers and brand managers should assess the extent to which negative publicity can damage image congruity and brand trust and come up with different repair strategies subsequently.

Originality/value

This study contributes to the limited and fragmented literature on consumers’ evaluations of negative information. Findings offer fresh insight into the impacts of negative publicity on image congruity and brand trust. The implications extend beyond negative publicity to other forms of negative information, such as rumors, fake news and negative word of mouth. Results also highlight the importance of adopting appropriate repair strategies to restore consumers’ trust in the event of negative publicity.

Details

Journal of Product & Brand Management, vol. 32 no. 1
Type: Research Article
ISSN: 1061-0421

Keywords

Open Access
Book part
Publication date: 4 June 2021

Kim Barker and Olga Jurasz

The ideal of an open, all-inclusive, and participatory internet has been undermined by the rise of gender-based and misogynistic abuse on social media platforms. Limited progress…

Abstract

The ideal of an open, all-inclusive, and participatory internet has been undermined by the rise of gender-based and misogynistic abuse on social media platforms. Limited progress has been made at supranational and national levels in addressing this issue, and where steps have been taken to combat online violence against women (OVAW), they are typically limited to legislative developments addressing image-based sexual abuse. As such, harms associated with image-based abuse have gained recognition in law while harms caused by text-based abuse (TBA) have not been conceptualized in an equivalent manner.

This chapter critically outlines the lack of judicial consideration given to online harms in British courts, identifying a range of harms arising from TBAs which currently are not recognized by the criminal justice system. We refer to non-traditional harms recognized in cases heard before the British courts, assessing these in light of traditionally recognized harms in established legal authorities. This chapter emphasizes the connection between the harms suffered and the recognition of impact on the victims, demonstrated through specific case studies. Through this assessment, this chapter advocates for greater recognition of online harms within the legal system – especially those which take the forms of misogynistic and/or gendered TBA.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 9 November 2021

Zareef Mohammed

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to…

3903

Abstract

Purpose

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach. This paper explores the key recovery areas necessary for data breach recovery.

Design/methodology/approach

Stakeholder theory and three recovery areas (customer, employee and process recovery) are proposed as necessary theoretical lens to study data breach recovery. Three data breach cases (Anthem, Equifax, and Citrix) were presented to provide merit to the argument of the proposed theoretical foundations of stakeholder theory and recovery areas for data breach recovery research.

Findings

Insights from these cases reveal four areas of recovery are necessary for data breach recovery – customer recovery, employee recovery, process recovery and regulatory recovery.

Originality/value

These areas are presented in the data recovery areas model and are necessary for: (1) organizations to focus on these areas when resolving data breaches and (2) future data breach recovery researchers in developing their research in the field.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 4 August 2020

Kanak Meena, Devendra K. Tayal, Oscar Castillo and Amita Jain

The scalability of similarity joins is threatened by the unexpected data characteristic of data skewness. This is a pervasive problem in scientific data. Due to skewness, the…

739

Abstract

The scalability of similarity joins is threatened by the unexpected data characteristic of data skewness. This is a pervasive problem in scientific data. Due to skewness, the uneven distribution of attributes occurs, and it can cause a severe load imbalance problem. When database join operations are applied to these datasets, skewness occurs exponentially. All the algorithms developed to date for the implementation of database joins are highly skew sensitive. This paper presents a new approach for handling data-skewness in a character- based string similarity join using the MapReduce framework. In the literature, no such work exists to handle data skewness in character-based string similarity join, although work for set based string similarity joins exists. Proposed work has been divided into three stages, and every stage is further divided into mapper and reducer phases, which are dedicated to a specific task. The first stage is dedicated to finding the length of strings from a dataset. For valid candidate pair generation, MR-Pass Join framework has been suggested in the second stage. MRFA concepts are incorporated for string similarity join, which is named as “MRFA-SSJ” (MapReduce Frequency Adaptive – String Similarity Join) in the third stage which is further divided into four MapReduce phases. Hence, MRFA-SSJ has been proposed to handle skewness in the string similarity join. The experiments have been implemented on three different datasets namely: DBLP, Query log and a real dataset of IP addresses & Cookies by deploying Hadoop framework. The proposed algorithm has been compared with three known algorithms and it has been noticed that all these algorithms fail when data is highly skewed, whereas our proposed method handles highly skewed data without any problem. A set-up of the 15-node cluster has been used in this experiment, and we are following the Zipf distribution law for the analysis of skewness factor. Also, a comparison among existing and proposed techniques has been shown. Existing techniques survived till Zipf factor 0.5 whereas the proposed algorithm survives up to Zipf factor 1. Hence the proposed algorithm is skew insensitive and ensures scalability with a reasonable query processing time for string similarity database join. It also ensures the even distribution of attributes.

Details

Applied Computing and Informatics, vol. 18 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 10 July 2021

Emmanuel Ndzibah, Giovanna Andrea Pinilla-De La Cruz and Ahm Shamsuzzoha

The purpose of this paper is to propose a conceptual framework for handling end of life (henceforth EoL) scenarios of solar photovoltaic (solar PV) panels, which includes…

4851

Abstract

Purpose

The purpose of this paper is to propose a conceptual framework for handling end of life (henceforth EoL) scenarios of solar photovoltaic (solar PV) panels, which includes different options available to businesses and end-users, as well as promoting the collaboration between government and all relevant stakeholders.

Design/methodology/approach

This paper adopts purposeful sampling, secondary data and content analysis to develop an appropriate conceptual framework that helps to create awareness of the appropriate options for dealing with the EoL cases of solar PV panels.

Findings

From the data analysis, it is revealed that reuse, repair and recycling of solar PV panels can ensure value creation, public-private partnership and a solution for education in sustainability, and thus, prolonging the useful life cycle of the products.

Research limitations/implications

This paper limits the analysis on developing economies and the use of selected literature based on the recycling of solar PV panels.

Originality/value

This paper is an initial attempt to create an awareness by identifying, analyzing and educating the stakeholders to handle appropriately any EoL scenario of solar PV panels.

1 – 10 of 40