Search results
1 – 10 of 30Howard Chitimira and Oyesola Animashaun
Banditry and terrorism constitute serious security risks in Nigeria. This follows the fact that Nigeria is rated as one of the leading states in the world that is plagued by…
Abstract
Purpose
Banditry and terrorism constitute serious security risks in Nigeria. This follows the fact that Nigeria is rated as one of the leading states in the world that is plagued by terrorism. Terrorists and bandits usually embark on predicate crimes such as kidnapping, smuggling, narcotics trade, and similar trades to finance their terrorist enterprises in Nigeria. The funds realized by criminals from nefarious sources such as sales of narcotics and ransom from kidnapping are usually laundered to make their criminal enterprises self-sustaining. Thus, all “dirty” money is laundered so as not to attract the attention of law enforcement agents. The funds realized through receipt of ransom from kidnapping, smuggling or funds from sponsors are laundered through channels such as bureau de change, which are difficult to monitor by the Nigerian authorities due, in part, to flaws and loopholes in the current anti-money laundering and anti-terrorist laws. This paper aims to adopt a doctrinal and qualitative desktop research methodology. In this regard, the current anti-money laundering and anti-terrorist laws are discussed to explore possible measures that could be adopted to remedy the flaws and loopholes in such laws and combat money laundering and financing of terrorism in Nigeria.
Design/methodology/approach
The article analyses the regulation and combating of money laundering and terrorist financing activities in Nigeria. In this regard, a doctrinal and qualitative research method is used to explore the flaws in the Nigerian anti-money laundering laws so as to recommend possible remedies in respect thereof.
Findings
It is hoped that policymakers and other relevant persons will use the recommendations provided in this article to enhance the curbing of money laundering and terrorist financing activities in Nigeria.
Research limitations/implications
The article is not based on empirical research.
Practical implications
This study is important and vital to all policymakers, lawyers, law students and regulatory bodies in Nigeria and other countries globally.
Social implications
The study seeks to curb money laundering and terrorist financing activities in Nigeria.
Originality/value
The study is based on original research which is focused on the regulation and combating of money laundering and terrorist financing activities in Nigeria.
Details
Keywords
Bernice Bissett, Philip Steenkamp and Duane Aslett
In the aftermath of the 2021 Financial Action Task Force Mutual Evaluation Report, legislators, supervisory bodies, law enforcement and the like are focusing on preventing South…
Abstract
Purpose
In the aftermath of the 2021 Financial Action Task Force Mutual Evaluation Report, legislators, supervisory bodies, law enforcement and the like are focusing on preventing South Africa from being greylisted. This paper performs an analysis of the 2021 South African Financial Action Task Force (FATF) Mutual Evaluation, specifically Recommendation 8 and Immediate Outcome 10. The purpose of this paper is to address the concerns raised and assist those tasked with implementing remediation measures.
Design/methodology/approach
Secondary sources such as legislation, case law, textbooks and peer-reviewed publications are used in addressing the concerns. A major focus is placed on the evaluation itself, with an analysis of Recommendation 8 and Immediate Outcome 10.
Findings
Despite the non-compliance rating and a low level of effectiveness received regarding non-profit organisations, authorities might not place a large focus on remediating this, as more pertinent issues arise in the report. The lack of focus in this area adds to the likelihood of grey listing by FATF. However, with co-operation from the relevant stakeholders, these low ratings can be improved.
Originality/value
Since the Mutual Evaluation’s release in October 2021 there have not been any papers addressing the highlighted issues in the non-profit sector in South Africa, to the best of the authors’ knowledge. This paper will be the first of its kind and will be of use to authorities as regards mitigating the concerns raised by FATF.
Details
Keywords
The aim of the present study is to shed light on the role of legal practitioners, namely, lawyers and notaries, in the fight against money laundering: Are they considered as…
Abstract
Purpose
The aim of the present study is to shed light on the role of legal practitioners, namely, lawyers and notaries, in the fight against money laundering: Are they considered as facilitators or obstacles against money laundering? How does the global and the EU legal framework deal with the legal professionals?
Design/methodology/approach
The research follows a deductive approach attempting to respond to questions such as: How do the lawyers’ and notaries’ societies react in front of the anti-money laundering measures that concern them and why? What are the discrepancies between the lawyers’ professional secrecy and the obligations that EU anti-money laundering legislation assigns them?
Findings
This study disclosures the response of the European union and international legal and regulatory framework as well as the reflexes of the international and European legal professionals’ associations to this danger. It also demonstrates the reaction of lawyers against European union anti-money laundering legislation, to the point that it limits not only the confidentiality principle but also the position of the European judicial systems to the contradiction between this principle and the lawyers’ obligation to report their suspicions to the authorities.
Research limitations/implications
To fulfil the study goals, it was necessary to overcome some obstacles, like the limitation of existing sources. Indeed, transnational empirical research considering the professionals who facilitate money laundering is narrow. Besides, policymakers and academics only recently expressed more interest in money laundering and its facilitators.
Originality/value
This paper fulfils an identified need to study the legal professionals’ role not only in money laundering practices but also in anti-money laundering policies.
Details
Keywords
This study aims to identify European positioning on the use of remote customer onboarding solutions in combating financial crime.
Abstract
Purpose
This study aims to identify European positioning on the use of remote customer onboarding solutions in combating financial crime.
Design/methodology/approach
This study is a desktop research that examines European Banking Authority (EBA) policy statements relating to the use of innovative solutions in combating financial crime.
Findings
Technological advancements in biometric data and software tools provide a unique opportunity to address potential paper customer onboarding process deficiencies. Electronic remote customer onboarding solutions equip credit, financial institutions and investment firms with an alternative FTE cost-saving solution, in their pursuit of revenue generation. Whilst the EBA and Financial Action Task Force have provided approval for the utilisation of innovative solutions and AML technologies in combatting financial crime. Hesitancy remains on the ability of credit and financial institutions to use technological solutions as a “magic solution” in preventing the materialisation of money laundering/terrorist financing related risks. Analysis of policy suggests a gravitation towards the increased use of the aforementioned technologies in the interim.
Originality/value
Capitalisation of European banking authority.
Details
Keywords
This paper aims to critically examine the digital transformation of anti-money laundering (AML) and countering the financing of terrorism (CFT) in light of the Financial Action…
Abstract
Purpose
This paper aims to critically examine the digital transformation of anti-money laundering (AML) and countering the financing of terrorism (CFT) in light of the Financial Action Task Force (FATF) San Jose principles, the Organisation for Economic Co-operation and Development (OECD) principles for artificial intelligence (AI) and the proposed European Union (EU) Artificial Intelligence Act. The authors argue that AI tools can revolutionize AML/CFT and asset recovery, but there is a need to strike a balance between optimizing AML efficiency and safeguarding fundamental rights.
Design/methodology/approach
This paper draws on reports, legislation, legal scholarships and other open-source data on the digital transformation of AML/CFT, particularly the deployment of AI in this context.
Findings
A new regulatory framework with robust safeguards is necessary to mitigate the risks associated with the use of new technologies in the AML context.
Originality/value
This study is one of the first to examine the use of AI in the AML/CFT context in light of the FATF San Jose principles, the OECD AI principles and the proposed EU AI Act.
Details
Keywords
The International Network of Research Management Societies (INORMS) celebrated its 20th anniversary in 2021. It was established to increase communication among research management…
Abstract
The International Network of Research Management Societies (INORMS) celebrated its 20th anniversary in 2021. It was established to increase communication among research management societies. The need for a formal international research management community developed because there was (1) increased international funding of research, (2) the number of international research collaborations was growing, and (3) there was a need to understand research regulations in other countries. INORMS sought to address these issues through international congresses and by providing a forum for member societies to work more closely together on common issues. Membership in INORMS steadily increased over the years. The 20th anniversary meeting was highlighted with the signing of the Hiroshima Statement that described a research manager’s principles and responsibilities, which include collegiality, inclusiveness, professionalisation, innovation, and accountability. This chapter summarises the factors that led to the formation of INORMS and its history.
Details
Keywords
Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer
Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…
Abstract
Purpose
Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.
Design/methodology/approach
Overall, 26 interviews were conducted with 21 participants from industry and academia.
Findings
The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.
Originality/value
The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.
Details
Keywords
Ozge Kozal, Mehmet Karacuka and Justus Haucap
In this study the authors aim to comprehensively investigate the determinants of voting behavior in Turkey, with a specific focus on the dynamics of the center-periphery debate…
Abstract
Purpose
In this study the authors aim to comprehensively investigate the determinants of voting behavior in Turkey, with a specific focus on the dynamics of the center-periphery debate. Mainly, the authors focus on regional voting patterns during the period that is dominated by the Justice and Development Party (JDP/AKP) in the elections. The authors apply the random effects generalized least squares (GLS) methodology, and analyze electoral data covering four pivotal parliamentary elections (2007, 2011, 2015 and 2018) across all 81 provinces (NUTS III regions). The authors individually examine voting dynamics of the four major parties in parliament: the JDP/AKP, the Republican People's Party (RPP/CHP), the Nationalist Movement Party (NMP/MHP) and the Peoples' Democratic Party (PDP/HDP). The authors contribute to a comprehensive understanding of how socioeconomic cleavages, economic performance, party alignment and social dynamics shape voter preferences in the Turkish context, thereby addressing gaps in the existing literature.
Design/methodology/approach
This research employs an ecological study of Turkish NUTS III sub-regions, covering national elections from 2007 to 2018. The authors utilize the random effects GLS method to account for heteroscedasticity and time effects. The inclusion of the June and November 2015 elections enables a comprehensive analysis of the evolving dynamics in Turkish voting behavior. The results remain robust when applying pooled OLS and fixed effect OLS techniques for control.
Findings
The study's findings reveal that economic performance, specifically economic growth, plays a pivotal role in the sustained dominance of the JDP/AKP party. Voters closely associate JDP preference with economic growth, resulting in higher voting shares during periods of economic prosperity. Along with economic growth; share of agriculture in regions' GDP, female illiteracy rate, old population rate, net domestic migration, terrorism and party alignment are also influential factors in the Turkish case. Furthermore, differences among sociocultural groups, and East–West dichotomy seem to be important factors that reveal the impact of social cleavages to understand electoral choice in Turkey.
Originality/value
This study contributes to the existing literature by offering a comprehensive multidimensional analysis of electoral behavior in Turkey, focusing on the JDP/AKP dominance period. The main contribution of this study is its multidimensional perspective on the power bases of all main parties, considering key voter choice theories (cleavages, party alignment and retrospective economic performance voting) that have not been systematically analyzed in prior research. The main research question of this study is to examine which factors affect voting behavior in Turkey and how the dynamics of center-periphery or eastern-western region voting behavior under the JDP hegemony can be explained. The contribution of this study consists not only in its empirical testing of panel data approaches but also in its comprehensive analysis of four major political parties. Building upon existing studies in the literature, this research seeks to extend the understanding of voting dynamics for the four main parties in the parliament — JDP/AKP, RPP/CHP, NMP/MHP and PPDP/HDP — by delving into their dynamics individually, thereby expanding the scope of previous studies. This study aims to make a contribution by not only empirically testing panel data approaches but also conducting a comprehensive analysis of four major political parties. Furthermore, the separate inclusion of the 2015 elections and utilization of a panel data approach enrich the analysis by capturing the evolving dynamics of Turkish voting behavior. The study underscores the significance of socioeconomic factors, economic performance and social cleavages for voters' choices within the context of a dominant party rule.
Details
Keywords
In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core…
Abstract
Purpose
In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core practices of collecting, analysing and disseminating financial intelligence.
Design/methodology/approach
Because FIU practices are often secret and its transaction data classified as state secrets, the FIU’s daily operational activities remain obscure. Drawing on interviews, public reports and an online training course, this study encircles secrecy and offers a fine-grained analysis of the FIU's core activities.
Findings
The article finds that the FIU plays a pivotal role in financial surveillance because it can operate at various intersections. An FIU operates at the intersection of finance and security, in between the public and private sector and at the national and international domain. This pivotal role makes the FIU indispensable in the surveillance of payment systems and spending behavior.
Social implications
The article poses that the desirability and effectiveness of financial surveillance has to date not received sufficient consideration, while it affects (the privacy of) anyone with a bank account. The article asks: is it ethically justifiable that transaction information is declared suspect, investigated, and shared nationally and internationally, without the individual or entity concerned officially being notified and legally named a suspect?
Originality/value
This case-study is not only relevant for the study of finance/security, AML/CFT and financial surveillance, but also to policy makers and the broader public who merit an understanding of how their financial behaviour is being surveilled.
Details
Keywords
Giovanna Centorrino, Valeria Naciti and Daniela Rupo
The study aims to investigate the impact of technological innovation, such as blockchain, in the music field from a value co-creation perspective, highlighting how it is…
Abstract
Purpose
The study aims to investigate the impact of technological innovation, such as blockchain, in the music field from a value co-creation perspective, highlighting how it is determining a radical change in the business model and value creation process.
Design/methodology/approach
To shed light on how blockchain adoption is reconfiguring the music industry, the authors adopted a qualitative-based approach based on a case study, allowing us to investigate value co-creation at three levels (macro, meso and micro) through exchange and integration of multi-actor resources.
Findings
The authors found that blockchain adoption in the music industry can singularly shape the business model, representing a powerful tool to enhance inter-organizational cooperation in value creation. It effectively deals with operational and business issues, besides financial transactions, profoundly impacting both the creation and distribution of value within the supply chain.
Research limitations/implications
The research contributes to a better understanding of innovation adoption in a specific setting, the music industry, giving support and guidance for players working in this ecosystem. The blockchain-music link helps close the gap between music and society through technology, thus providing a foundation for future research.
Originality/value
The paper provides new insights into the antecedents and mechanisms of value co-creation, spanning macro-, meso-, and micro-levels of context. It also illustrates the factors underpinning Bitsong viability to embed the value co-creation perspective in designing the business model within a value network.
Details