1,743 research outputs found

    Revisiting Corruption Control Strategies: Review and Implications for Anti-Corruption Design Policy

    Get PDF
    This study provides a desk-research overview of the corruption control strategies, especially on the implementation of rewards and incentive, monitoring, whistleblowing system, anti-corruption agencies and punishment. This study, in essence, use desk-research approach, with reliance on the secondary source of data, notably articles in published journals. This study finds that rigorous empirical evaluation of corruption control strategies is scarce yet promising. From the review, this article implies that corruption is indeed a multifaceted problem, therefore relying on a particular strategy might not be sufficient to curb corrupt acts. The implication for the design of anti-corruption policy is discussed. Keywords: corruption; anti-corruption; corruption control strategy

    Acceptance or Resignation? Surveillance Technologies in China between the Social Credit System and Covid-19

    Get PDF
    openIn this thesis, I investigate the factors contributing to the high level of approval for the Social Credit System (SCS) in Cina. I explore the Chinese model of e-governance, provide a detailed overview of the SCS, explore the measures adopted to contrast the Covid-19 pandemic and the backlash they caused in the form of the "A4 Revolution", and finally I analyze and explain the high level of public support for the SCS. My research employs a qualitative strategy based on an abductive approach which correlates theory and findings in order to answer my selected research question. Key findings indicate that the integration of advanced technology, cultural values of social harmony, and the Chinese government's efforts to balance surveillance and privacy have contributed to the widespread acceptance of the SCS. I conclude that a combination of historical, cultural, and technological factors plays a significant role in the approval of the SCS, shedding light on the complex dynamics of governance in the digital age.In this thesis, I investigate the factors contributing to the high level of approval for the Social Credit System (SCS) in Cina. I explore the Chinese model of e-governance, provide a detailed overview of the SCS, explore the measures adopted to contrast the Covid-19 pandemic and the backlash they caused in the form of the "A4 Revolution", and finally I analyze and explain the high level of public support for the SCS. My research employs a qualitative strategy based on an abductive approach which correlates theory and findings in order to answer my selected research question. Key findings indicate that the integration of advanced technology, cultural values of social harmony, and the Chinese government's efforts to balance surveillance and privacy have contributed to the widespread acceptance of the SCS. I conclude that a combination of historical, cultural, and technological factors plays a significant role in the approval of the SCS, shedding light on the complex dynamics of governance in the digital age

    Targeted Enforcement against Illicit Trade in Tobacco Products

    Get PDF
    Illicit trade in tobacco is a substantial and growing problem in the U.S., causing loss of tax revenue, damage to public health, and threats to public safety. Decisions about enforcement against ITTP involve tradeoffs among competing objectives. Good policy design can improve the terms of those tradeoffs but cannot eliminate them. We examine questions about the allocation of enforcement resources against ITTP, and its distribution across activities, individuals, and organizations: in particular, whether and how to differentially target ITTP that involves violence or support for terrorism. We consider the problem of developing effective strategies for enforcement, applying both lessons from experience with markets for illicit drugs and theoretical insights about enforcement targeting and dynamic concentration. We show that targeted enforcement and focused deterrence are more efficient than unfocused enforcement, and that – when other policy changes increase the potential rewards to illicit activity – enforcement resources applied earlier (before illicit markets have grown) will have greater impact than enforcement resources applied later (and therefore to larger markets). We discuss additional considerations, ranging from real-world complications left out of the simple models to examination of how insights from behavioral law and economics may modify conclusions based on a theory of deterrence designed for homo economicus

    Three Essays on Individuals’ Vulnerability to Security Attacks in Online Social Networks: Factors and Behaviors

    Get PDF
    With increasing reliance on the Internet, the use of online social networks (OSNs) for communication has grown rapidly. OSN platforms are used to share information and communicate with friends and family. However, these platforms can pose serious security threats to users. In spite of the extent of such security threats and resulting damages, little is known about factors associated with individuals’ vulnerability to online security attacks. We address this gap in the following three essays. Essay 1 draws on a synthesis of the epidemic theory in infectious disease epidemiology with the social capital theory to conceptualize factors that contribute to an individual’s role in security threat propagation in OSN. To test the model, we collected data and created a network of hacked individuals over three months from Twitter. The final hacked network consists of over 8000 individual users. Using this data set, we derived individual’s factors measuring threat propagation efficacy and threat vulnerability. The dependent variables were defined based on the concept of epidemic theory in disease propagation. The independent variables are measured based on the social capital theory. We use the regression method for data analysis. The results of this study uncover factors that have significant impact on threat propagation efficacy and threat vulnerability. We discuss the novel theoretical and managerial contributions of this work. Essay 2 explores the role of individuals’ interests in their threat vulnerability in OSNs. In OSNs, individuals follow social pages and post contents that can easily reveal their topics of interest. Prior studies show high exposure of individuals to topics of interest can decrease individuals’ ability to evaluate the risks associated with their interests. This gives attackers a chance to target people based on what they are interested in. However, interest-based vulnerability is not just a risk factor for individuals themselves. Research has reported that similar interests lead to friendship and individuals share similar interests with their friends. This similarity can increase trust among friends and makes individuals more vulnerable to security threat coming from their friends’ behaviors. Despite the potential importance of interest in the propagation of online security attacks online, the literature on this topic is scarce. To address this gap, we capture individuals’ interests in OSN and identify the association between individuals’ interests and their vulnerability to online security threats. The theoretical foundation of this work is a synthesis of dual-system theory and the theory of homophily. Communities of interest in OSN were detected using a known algorithm. We test our model using the data set and social network of hacked individuals from Essay 1. We used this network to collect additional data about individuals’ interests in OSN. The results determine communities of interests which were associated with individuals’ online threat vulnerability. Moreover, our findings reveal that similarities of interest among individuals and their friends play a role in individuals’ threat vulnerability in OSN. We discuss the novel theoretical and empirical contributions of this work. Essay 3 examines the role addiction to OSNs plays in individuals’ security perceptions and behaviors. Despite the prevalence of problematic use of OSNs and the possibility of addiction to these platforms, little is known about the functionalities of brain systems of users who suffer from OSN addiction and their online security perception and behaviors. In addressing these gaps, we have developed the Online addiction & security behaviors (OASB) theory by synthesizing dual-system theory and extended protection motivation theory (PMT). We collected data through an online survey. The results indicate that OSN addiction is rooted in the individual’s brain systems. For the OSN addicted, there is a strong cognitive-emotional preoccupation with using OSN. Our findings also reveal the positive and significant impact of OSN addiction on perceived susceptibility to and severity of online security threats. Moreover, our results show the negative association between OSN addiction and perceived self-efficacy. We discuss the theoretical and practical implications of this work

    Addressing educational access and retention of orphaned and vulnerable children in high HIV prevalence communities in rural Malawi : a flexible approach to learning

    Get PDF
    In Malawi, where a policy of Free Primary Education has been in place for more than fifteen years, relatively few children have never attended school. However, despite high initial enrolments, primary education in Malawi is inefficient, with high dropout and low completion rates. Against a context of underlying poverty, research suggests that many of the children in Malawi denied adequate access to education are those orphaned or made vulnerable by HIV/AIDS. Evidence from Malawi and neighbouring countries indicates that not enough is being done in schools to support vulnerable children in the context of HIV/AIDS and that a powerful argument can be made for new, more flexible models of formal schooling that reach out to young people who face educational exclusion. This doctoral study demonstrates the potential of flexible learning to enhance learning experiences, bring psychosocial benefits and help improve retention of vulnerable pupils in primary schools in high HIV prevalence communities in rural Malawi, with important, positive spill-over effects to pupils at risk of dropout. It also argues that effective innovation requires strategies to create an enabling environment and promote an inclusive philosophy within schools. Further insights were drawn from the perspectives of actors on the benefits, shortfalls and outcomes of the intervention, as well as the successes and challenges of the implementation process. A synthesis and discussion of the empirical findings in relation to the wider literature explores the possibilities for introducing more flexible modes of educational delivery and support within formal schooling.ESRC-DFI
    • …
    corecore