Tramadol control poses international medical risks

Significance Diversion from legitimate pharmaceutical stocks, counterfeiting, adulteration and false labelling are key problems. National and international responses emphasising stricter controls and more robust law enforcement will not eliminate illegal trade and risk counterproductive impacts. Impacts Tramadol’s social acceptability compared with other drugs, even alcohol, will make its misuse harder to tackle. The circulation of counterfeit or adulterated tramadol poses serious health risks. The popularity of tramadol will make black market supply lucrative.

2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Fabian Maximilian Johannes Teichmann ◽  
Marie-Christin Falker

Purpose This paper aims to illustrate how illegally obtained funds are laundered through raw diamonds in Austria, Germany, Liechtenstein and Switzerland. Design/methodology/approach To identify specific money laundering techniques involving raw diamonds, this study used a qualitative content analysis of data collected from 60 semi-standardized interviews with both criminals and prevention experts and a quantitative survey of 200 compliance officers. Findings Raw diamonds are extraordinarily suitable for money laundering in European German-speaking countries. In particular, they may be used in all three stages of the laundering process, namely, placement, layering and integration. Research limitations/implications Because the qualitative findings are based on semi-standardized interviews, their insights are limited to the perspectives of the 60 interviewees. Practical implications Identifying gaps in existing anti-money laundering mechanisms should provide compliance officers, law enforcement agencies and legislators with valuable insights into how criminals operate. Originality/value While prior studies focus on the methods used by organizations to combat money laundering and how to improve anti-money laundering measures, this paper investigates how money launderers operate to avoid detection, thereby illustrating authentic experiences. Its findings provide valuable insights into the minds of money launderers and combines criminal perspective with that of prevention experts.


2015 ◽  
Vol 18 (2) ◽  
pp. 234-247 ◽  
Author(s):  
George Henry Millard ◽  
Tim Hundleby

Purpose – The purpose of this paper is to look at the origins and development of organized crime in Brazil. Design/methodology/approach – The authors draw on their experience working in law enforcement for many years in Brazil. Findings – The paper outlines the major crimes committed by organized crime in Brazil and the structure of the main organization carrying them out. Research limitations/implications – The research concentrates on São Paolo and further research needs to be done. Originality/value – This is the first attempt to put the development of organized crime in Brazil into a historical and developmental context.


2015 ◽  
Vol 16 (1) ◽  
pp. 74-76
Author(s):  
Miriam Fisher ◽  
Brian McManus

Purpose – To explain the details and implications of a September 9, 2014 federal indictment, US v. Robert Bandfield, the first time a Foreign Account Tax Compliance Act (FATCA) violation has been charged as an “overt act” in furtherance of a tax conspiracy and securities fraud. Design/methodology/approach – Provides background, including the enactment of FATCA and the details of the indictment; describes an undercover investigation conducted by President Obama’s Financial Fraud Enforcement Task Force; and discusses the warnings this indictment sends to the global financial community. Findings – The indictment confirms the coordinated and aggressive tactics US law enforcement is now employing to investigate and prosecute offshore financial fraud. Practical implications – Banks and financial service providers need to be aware of the impact of enhanced US regulatory obligations and implement appropriate compliance measures. These institutions must also remain sensitive to risks presented by unscrupulous customers. Finally, they must be ready to manage appropriately information-gathering and investigatory inquiries originating with US authorities. Originality/value – Practical guidance from experienced tax controversy lawyers.


Significance The 7.2-magnitude earthquake caused widespread damage to buildings and infrastructure. The disaster comes amid political turmoil, following the assassination of President Jovenel Moise last month, and threatens to compound pre-existing socioeconomic challenges stemming from the COVID-19 pandemic, surging crime rates, and fuel shortages in some areas. Impacts The Dominican Republic is sending aid, but will also increase security along its border to prevent increased migration. Gangs will seek to extort humanitarian groups or siphon off relief supplies to sell on the black market. Henry’s increased reliance on external assistance could affect trust in his administration, especially if elections are delayed too long.


2022 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Michael A. Hansen ◽  
John C. Navarro ◽  
Sierra A. Malvitz

PurposeThe purpose of this study is to explore the availability of information on law enforcement websites in the state of Wisconsin.Design/methodology/approachThe study conducted a content analysis of all 179 county and municipal local law enforcement agency websites within Wisconsin. The authors then implemented a comparative analysis that explored whether the quantity and quality of information available on law enforcement websites are similar to those of local governments and school districts. The authors then estimated models to test whether there is a relationship between the population size served and gender distribution of law enforcement departments to the availability of information on law enforcement websites.FindingsLaw enforcement websites contain a noticeable lack of information. The finding is even more apparent when comparing law enforcement websites to the websites of local governments and school districts. Finally, the authors show a positive link between information sharing on law enforcement websites and the proportion of the civilian staff at an agency that are women.Originality/valuePast studies that reviewed the make-up of law enforcement websites analyzed large law enforcement departments rather than local law enforcement departments, which notably represent the majority of most law enforcement departments. The authors also explicitly demonstrate that the commitment to information sharing is lagging within law enforcement websites compared to local-level governments. Future scholarship and law enforcement departments may benefit from exploring the employment of female civilians.


2018 ◽  
Vol 25 (4) ◽  
pp. 951-961
Author(s):  
Yara El Siwi

Purpose The gruesome attacks of 11 September 2001 signalled a powerful paradigm shift in international politics: governments previously accustomed to military menaces were now being increasingly threatened by independent, non-state actors. Consequently, a plethora of literature emerged, looking to better understand the nature of these actors. An aspect that has attracted substantial interest is the inter-relation between terrorism and organised crime (OC). This paper aims to answer the question as to whether, for the purpose of controlling and mitigating the threat they pose to society, there is meaning in differentiating between terrorist organisations (TOs) and organised crime groups (OCGs). Design/methodology/approach The first section of the paper will provide an account of the various kinds of threats posed by OCGs and TOs. The subsequent section will question whether it is possible, in today’s globalised era, to distinguish between these two actors, while the last sections will ask if such a differentiation is desirable. Findings OCGs and TOs display a clear divergence: the former’s motivation is financial while the latter’s political. With the end of the Cold War, however, each type of organisation has been building up the capabilities of the other, helped by the force of global networks. As such, these two actors now exist within the same body – a continuum – that renders their separation difficult. As to the question of desirability, the separation of the two phenomena has often led to the adoption of highly disproportionate militarised and securitised measures, resulting in a dangerous blending of law enforcement and security service methodology. Originality/value Many have argued for the separation of the “terrorist” from the “criminal”, on the grounds that the former is particularly heinous and deserving of more severe measures. Others have studied the evolution of these two phenomena to understand whether the lines separating them have been blurring and the extent to which this affects law-enforcement. This paper goes beyond notions of feasibility and poses the following question: has the traditional separation of these phenomena led to a desirable regime?


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mariola Jolanta Marzouk

Purpose This paper aims to provide unique empirical findings exploring the impact of the UK’s post-Brexit Economic Strategy to boost trade with developing countries on the UK banking sector’s ability to manage trade-based money laundering risks. Design/methodology/approach Exploratory research design that used structured literature review, followed by semi-structured interviews with key subject matter experts employed by large UK banks. Findings Both banks and law enforcement struggle to prioritise trade-based money laundering (TBML) intelligence discovery due to deficient skills, resources, technology and lack of strong regulatory stimulus. The regulated sector calls for the UK anti-money laundering (AML) reform that would better incentivise TBML deterrence, yet the Government underestimates the money laundering risks while trading with high-risk jurisdictions post-Brexit. Research limitations/implications The findings are based on a small sample of six semi-structured interviews with difficult to access population of key subject matter experts. Despite the small sample, participants provided well-articulated and informed insights. Practical implications The UK’s post-Brexit Economic Strategy to boost trade with developing countries downplays the TBML risks it carries. The findings should alert UK banks, law enforcement and the Government who will collectively bear the responsibility to effectively manage TBML while enabling smooth trading. Originality/value The research provides unique perceptions of UK banks’ senior subject matter experts on managing TBML threats from opportunistic criminals.


2018 ◽  
Vol 26 (3) ◽  
pp. 327-337 ◽  
Author(s):  
Debi Ashenden

Purpose The purpose of this study is to uncover employee attitudes towards information security and to address the issue of social acceptability bias in information security research. Design/methodology/approach The study used personal construct psychology and repertory grids as the foundation for the study in a mixed-methods design. Data collection consisted of 11 in-depth interviews followed by a survey with 115 employee responses. The data from the interviews informed the design of the survey. Findings The results of the interviews identified a number of themes around individual responsibility for information security and the ability of individuals to contribute to information security. The survey demonstrated that those employees who thought the that organisation was driven by the need to protect information also thought that the risks were overstated and that their colleagues were overly cautious. Conversely, employees who thought that the organisation was driven by the need to optimise its use of information felt that the security risks were justified and that colleagues took too many risks. Research limitations/implications The survey findings were not statistically significant, but by breaking the survey results down further across business areas, it was possible to see differences within groups of individuals within the organisation. Originality/value The literature review highlights the issue of social acceptability bias and the problem of uncovering weakly held attitudes. In this study, the use of repertory grids offers a way of addressing these issues.


2017 ◽  
Vol 20 (2) ◽  
pp. 172-189 ◽  
Author(s):  
Perri Reynolds ◽  
Angela S.M. Irwin

Purpose The purpose of this paper is to critically analyse research surrounding the anonymity of online transactions using Bitcoin and report on the feasibility of law enforcement bodies tracing illicit transactions back to a user’s real-life identity. Design/methodology/approach The design of this paper follows on from the approach taken by Reid and Harrigan (2013) in determining whether identifying information may be collated with external sources of data to identify individual users. In addition to conducting a detailed literature review surrounding the anonymity of users, and the potential ability to track transactions through the blockchain, four Bitcoin exchange services are examined to ascertain whether information provided at the sign-up stage is sufficiently verified and reliable. By doing so, this research tests the ability for law enforcement to reasonably rely upon this information when attempting to prosecute individuals. Additionally, by submitting fake information for verification, the plausibility of these services accepting fraudulent or illegitimate information is also tested. Findings It may be possible to identify and prosecute bad actors through the analysis of transaction histories by tracing them back to an interaction with a Bitcoin exchange. However, the compliance and implementation of anti-money laundering legislation and customer identification security standards are insufficiently used within some exchange services, resulting in more technologically adept, or well-funded, criminals being able to circumvent identification controls and continue to transact without revealing their identities. The introduction of and compliance with know-your customer and customer due diligence legislation is required before law enforcement bodies may be able to accurately rely on information provided to a Bitcoin exchange. This paper highlights the need for research to be undertaken to examine the ways in which criminals are circumventing identity controls and, consequently, financing their illicit activities. Originality/value By ascertaining the types of information submitted by users when exchanging real currency for virtual currency, and seeing whether this information may be accepted despite being fraudulent in nature, this paper elucidates the reliability of information that law enforcement bodies may be able to access when tracing transactions back to an individual actor.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Philein Hafidz Al Kautsar ◽  
Nur Budi Mulyono

PurposeThe purpose of this study is to develop an ecosystem-based DRR concept and explore how far the concept can be applied in a disaster-management context.Design/methodology/approachThe authors used the ecosystem concept established by Tsujimoto et al. (2018) as the foundation of this study. They then conducted a literature search to adapt the ecosystem concept to fit the context of disaster management. Thus, they developed an ecosystem-based DRR concept. They used a case study method to test whether the adapted ecosystem concept can be applied to examine a real-life case of disaster management. For data collection, they used qualitative methods; a semi-structured interview with practitioners and other actors involved in disaster-management practice as well as document review. For data analysis, they used thematic analysis to find themes within the data.FindingsBy using this concept, the authors found some actors fulfil their role in the ecosystem toward the DRR effort, some actors are ill-equipped, and some actors are actively working against DRR effort. There are also implementation challenges, as numerous programs are only halfway done due to a lack of resources. However, the main problems of this disaster can be summarized into three categories: technical problems, socio-economic problems and law-enforcement problems. All three problems need to be addressed altogether because even neglecting only one problem would lead to a flawed solution.Research limitations/implicationsOne of the limitations is the respondents' bias. This research aims to find out their part, or more accurately what they are representative of, regarding disaster management for forest and land fire case. As some of the questions may reveal unflattering action or may even hurting their credibility, respondents might not have provided an entirely honest answer. Another limitation is the differing respondents' roles within the disaster. As each of the respondents is a representative of an actor in disaster management, they all have different traits. Thus, this situation makes it challenging to produce similar quality and quantity data for each of them.Practical implicationsAs concluded, the ecosystem-based DRR concept can be used as a framework to examine a real-life case of disaster management. It can be utilized to explain roles, relationships and the whole network of disaster-management actors. The authors hope that this concept could help decision-makers in designing their policies.Social implicationsThe main problems of this disaster can be summarized into three categories: technical problems, socio-economic problems and law-enforcement problems. All three problems need to be addressed altogether for even neglecting only one problem would lead to a flawed solution. However, the yearly reoccurrences of fires and the widespread of illegal and dangerous practice, slash and burn agriculture, are evidence that the government mishandles the other two problems. There is a need for reform within legal institutions and government's treatment regarding local farmers. There is a need for trust, cooperation and synergy between disaster-management actors.Originality/valueThe ecosystem concept has been used widely in the field of management of technology and innovation. However, while ecosystem concept is commonly used in the management of technology and innovation, it is rarely used in a disaster-management context.


Sign in / Sign up

Export Citation Format

Share Document