scholarly journals Italy: money transfer, money laundering and intermediary liability

2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Livio Corselli

Purpose This paper aims to offer a general overview of money transfers in Italy and Europe focussing specifically on the migrant community. This is of particular interest because it is in that community where money transfers are most prevalent. This shows the money transfer system as a tool that could guarantee the financial inclusion of migrants but at the same time being used in a distorted and unlawful manner. Design/methodology/approach After a brief introduction focussed on working principles and legal frameworks, the paper will go deeper in evaluating money transfer data. This data, which comes from various legal authorities, will show the extent to which different migrant communities who reside in Italy are able to carry out illicit activity using money transfers. It will also highlight the existence of legislative inconsistencies through a case by case approach. Findings This paper shows the reason why people find it relatively easy to use money transfers to launder money or in a broader sense, take part in other illicit financial operations such as financing terrorism. Originality/value This study will examine recent Italian criminal cases concerning the unlawful use of money transfers. This paper is the original study of the author and has not been submitted elsewhere for publication.

2019 ◽  
Vol 22 (4) ◽  
pp. 744-752
Author(s):  
Sisira Dharmasri Jayasekara ◽  
Iroshini Abeysekara

Purpose The purpose of this paper is to discuss the role of digital forensics in an evolving environment of cyber laws giving attention to Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC) countries, comprising Bangladesh, India, Myanmar, Sri Lanka, Thailand, Nepal and Bhutan, in a dynamic global context. Design/methodology/approach This study uses a case study approach to discuss the digital forensics and cyber laws of BIMSTEC countries. The objective of the study was expected to be achieved by referring to decided cases in different jurisdictions. Cyber laws of BIMSTEC countries were studied for the purpose of this study. Findings The analysis revealed that BIMSTEC countries are required to amend legislation to support the growth of information technology. Most of the legislation are 10-15 years old and have not been amended to resolve issues on cyber jurisdictions. Research limitations/implications This study was limited to the members of the BIMSTEC. Originality/value This paper is an original work done by the authors who have discussed the issues of conducting investigations with respect to digital crimes in a rapidly changing environment of information technology and deficient legal frameworks.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jeannette Strickland

Purpose This paper aims to build on Fred Beard’s study of the world’s archives to identity historical advertising and marketing ephemera, published in this journal in 2018, by focussing on resources available in Europe to augment his survey. Design/methodology/approach Online searching, supplemented by literature emanating from the business archive sector, led to the identification of 177 repositories or online sites in Europe holding advertising and marketing archives of significance for researchers. These are set out in two accompanying tables. Findings A wide diversity of European archives that are open to researchers is revealed in this paper. Many are the archives of the business themselves, but a number of collecting repositories are also listed, brought together for the first time. Research limitations/implications This paper focusses solely on Europe but does not claim to be comprehensive, as the study was time-limited and readers will, no doubt, know of resources that the author has missed. The findings relate mostly to Western Europe, so there is scope for further study to encompass archives in the former eastern bloc. Exploration of sources in Africa, Asia and Latin America would further supplement Beard’s original study. Originality/value This research brings together the broadest list of advertising and marketing sources open to researchers in Europe published to date. As Beard’s focus was more on the Americas, this examination redresses the balance with an array of European sources which, it is hoped, will contribute to the greater use of many little-known or under-researched resources by researchers across the world.


Author(s):  
Julian Veitengruber ◽  
Frank Rinderknecht ◽  
Horst E. Friedrich

Purpose – The purpose of this paper is to devote the optimal substitution of slip rings through an inductive power transfer system for field winding supply of generators or motors with a wound rotor. By a rotational pot-core transformer approach, the rotor-side energizing of the excitation windings can be provided isolated and free of wear. Design/methodology/approach – For design purpose, an analytical model of the inductive link and the compensation network elements is shown. Based on a pot-core transformer approach, possible types of compensation networks regarding motor-specific constraints were carried out and compared among themselves by parameter studies. The analytical parts of the model were subsequently validated with measured data of an appropriate core and accompanying FEM calculations. On the basis of an experimental prototype system, the approach has been tested both stationary and transient. Findings – The publication exemplifies how a brushless excitation system for generators and motors can be inexpensively designed and implemented. Originality/value – This paper systematically presents a comprehensive analytical approach for brushless excitation systems as well as a prototypical system. Compensation network elements regarding motor-specific constraints were carried out and compared among themselves by parameter studies.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Keren Dali

PurposeDrawing on the survey of Spanish-speaking immigrant and migrant readers in Canada and the US, this study pursues three goals: (1) examine the image of the library held by these readers and trace the change of this image after the international migration; (2) use the study findings to revise and update the currently existing typologies of the image of the library; and (3) understand ethical and effective research practices in the studies of immigrant/migrant communities whereby researchers are external to communities in question.Design/methodology/approachThe data about immigrant/migrant readers were collected through a self-administered survey questionnaire that was available both in print and electronically, both in Spanish and English. The data analysis was guided by hermeneutic phenomenology, as explicated in the article. Theoretical examination of the image of the library relied on the earlier typology developed by V. Stelmakh.FindingsThe study elucidates perceptions of libraries and librarians in both North America and countries of origin held by Spanish-speaking immigrant/migrant readers, and highlights changes that occur in the image of the library as readers move across geographic borders. Building on the empirical data, the article develops a new typology of the image of the library. It also offers insight into ethical and effective ways of engaging with immigrant communities that should be upheld by researchers from outside the communities in question.Originality/valueIt is the first known study that systematically traces the changes in the image of the library which occur alongside geographic and sociocultural migrations. It is also the first known study that focuses specifically on readers rather than library users in general. The new typology consists of four different elements – the cultural image; the functional image; the humanistic image; and the ideological image of the library – and is accompanied by detailed definitions of each.


2015 ◽  
Vol 30 (1) ◽  
pp. 22-48
Author(s):  
R. Mithu Dey ◽  
Lucy Lim

Purpose – The purpose of this paper is to replicate Richardson et al.’s (2005) study on how accrual components’ reliability affects earnings persistence and whether investors anticipate the lower earnings persistence through stock return. In this study, the authors use more recent data to examine whether the previous results still hold. Design/methodology/approach – The authors run the analysis using Richardson et al.’s (2005) design of ordinary least squares and report the results using Fama and Macbeth’s (1973) procedures. Findings – The results corroborate Richardson et al.’s (2005) conclusions that lower reliability of total accrual (accrual components) leads to lower earnings persistence. Originality/value – This study replicates Richardson et al. (2005) using more recent US data. The results in this paper confirm the general conclusion in the original study: less reliable accruals lead to lower earnings persistence.


2015 ◽  
Vol 36 (6/7) ◽  
pp. 462-475 ◽  
Author(s):  
Mary Wilkins Jordan

Purpose – The purpose of this paper is to identify competencies in common across public library managers. Design/methodology/approach – The request for public library managers to participate in this survey was posted to the public listserve. Participants were asked about the tasks they do regularly, to identify the skills currently seen as most important in their work. They were then given a list of competencies, and asked to identify those they felt were most important for current public library managers, for those in future managers. Findings – Some commonalities emerged, but there was not a substantial amount of overlap between skills identified by directors and non-director managers as important now or into the future. Research limitations/implications – Further research into managerial competencies focussed on specific job titles is necessary to see what kinds of skills each may value. Likewise, a broader look at public library managers may provide a better set of common competencies that will be useful for both training and hiring. Practical implications – Understanding strategies for managerial competencies will be useful in building successful training programs. Social implications – Learning in this study that it will be challenging to carry out training relevant to all types of public library managers is useful; instead it can be tailored to different levels of managers for more success. Originality/value – This is an original study, building on other work the author has carried out. The value is in understanding the real needs of managers, not just anecdotal stories.


Info ◽  
2015 ◽  
Vol 17 (6) ◽  
pp. 72-96 ◽  
Author(s):  
Christina Angelopoulos

Purpose – The purpose of this article is to analyse the concept of a fair balance between conflicting fundamental rights in the context of intermediary liability for third party copyright infringement. Design/methodology/approach – European Legal Method. Findings – Fair balance is the appropriate conflict resolution mechanism in cases of fundamental rights clashes. Balancing is in essence a call for rational judicial deliberation. In intermediary liability, balancing excludes the imposition of filtering obligations on intermediaries for the purpose of copyright enforcement, but allows blocking. Originality/value – An in-depth look at a complicated, vague and underdeveloped area of law with significant practical effect.


2019 ◽  
Vol 46 (6) ◽  
pp. 715-733
Author(s):  
Mohammad Hashemi Joo ◽  
Yuka Nishikawa ◽  
Krishnan Dandapani

Purpose The purpose of this paper is to identify the applications and contributions of blockchain technology in finance in general, and to identify areas where the technology can make a larger impact in payment systems. Design/methodology/approach The authors do an exhaustive review of blockchain technology and cryptocurrency, and examine the successful applications of blockchain technology in several finance disciplines including cryptocurrency. The authors critically evaluate the technical studies on behaviors in cryptocurrency prices. Findings Cryptocurrency is the first successful application of blockchain technology and can be used as the main fuel of the global money transfer network. Research limitations/implications Blockchain is a revolutionary technology that can change the world with its convenience, transparency, accuracy and efficiency in speed and cost. The growth of blockchain usage in finance depends on further familiarization and trust gained by an increasing number of proven successful usage cases and testimonials as well as appropriate legislative changes. Originality/value This paper provides a comprehensive review of the contributions that blockchain technology has made and is expected to make in the field of finance with the aim of adding value to corporate executives, investors, policy makers and a general audience.


2018 ◽  
Vol 26 (4) ◽  
pp. 437-453 ◽  
Author(s):  
Majed Alshammari ◽  
Andrew Simpson

Purpose Concerns over data-processing activities that may lead to privacy violations or harms have motivated the development of legal frameworks and standards. Further, software engineers are increasingly expected to develop and maintain privacy-aware systems that both comply with such frameworks and standards and meet reasonable expectations of privacy. This paper aims to facilitate reasoning about privacy compliance, from legal frameworks and standards, with a view to providing necessary technical assurances. Design/methodology/approach The authors show how the standard extension mechanisms of the UML meta-model might be used to specify and represent data-processing activities in a way that is amenable to privacy compliance checking and assurance. Findings The authors demonstrate the usefulness and applicability of the extension mechanisms in specifying key aspects of privacy principles as assumptions and requirements, as well as in providing criteria for the evaluation of these aspects to assess whether the model meets these requirements. Originality/value First, the authors show how key aspects of abstract privacy principles can be modelled using stereotypes and tagged values as privacy assumptions and requirements. Second, the authors show how compliance with these principles can be assured via constraints that establish rules for the evaluation of these requirements.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hartmut Hoehle ◽  
Jia Wei ◽  
Sebastian Schuetz ◽  
Viswanath Venkatesh

PurposeIn the aftermath of data breaches, many firms offer compensation to affected customers to recover from damaged customer sentiments. To understand the effectiveness of such compensation offerings, Goode et al. (2017) examined the effects of compensation offered by Sony following the PlayStation Network breach in 2011. Although Goode et al. (2017) present key insights on data breach compensation, it is unclear whether their findings generalize beyond the context of subscription-based gaming platforms whose customers are young and experience substantial switching costs. To address this issue, we conducted a methodological replication in a retail context with low switching costs.Design/methodology/approachIn our replication, we examine the effects of compensation offered by Home Depot in the aftermath of its data breach in 2014. Home Depot is the largest home improvement retailer in the US and presents a substantially different context. Data were collected from 901 participants using surveys.FindingsOur results were consistent with the original study. We found that in retail breaches, effective compensation needs to meet customers' expectations because overcompensation or undercompensation leads to negative outcomes, such as decreased repurchase intention.Originality/valueOur study provides insights into the effectiveness of compensation in the retail context and confirms the findings of Goode et al. (2017).


Sign in / Sign up

Export Citation Format

Share Document