Browse by title

You are looking at 1 - 10 of 278 items :

  • Law - Academic x
  • Economics and Finance x
  • International Economics x
  • Chapters/Articles x
Clear All Modify Search
You do not have access to this content

Romain Wacziarg

You do not have access to this content

Romain Wacziarg

This content is available to you

Romain Wacziarg

You do not have access to this content

Dennis Collopy

The UK’s Intellectual Property Office (IPO) commissioned research in 2015, by a team led by the University of Hertfordshire, on the impact of social media on Intellectual Property Rights (IPR), specifically to assess the ways in which social media platforms might facilitate IPR infringement in relation to physical goods (‘counterfeits’). The range of trade bodies and sectors involved in the research was shaped by those whose goods were most widely impacted by the availability of illicit goods through social media. Employing the required methodology for assessing the extent of social media’s effect on IPR in physical goods meant there were two key aims: firstly, to compare data and insights from industry, government and consumers to produce a representation of recent levels of counterfeiting within the UK and, secondly, to assess the extent to which this kind of illicit behaviour is moving online and is being facilitated by online social media platforms. The more specific objectives of the study involved assessments of the scale, impact and characteristics of infringements, as well as opportunities for IPR.

You do not have access to this content

Ross S. Delston and Stephen C. Walls

Anti-money laundering and combating the financing of terrorism (AML/CFT) measures have succeeded in restricting the two traditional avenues of money laundering, namely, the abuse of financial intermediaries and the physical movement of money across borders. Consequently, international criminal and terrorist organizations have turned to trade-based money laundering (TBML) to conceal and legitimize their funds, as this is a channel that remains relatively untouched by international AML/CFT efforts. This abuse of the global trade network has received increasing recognition from the Financial Action Task Force, the international standard-setter, as the next front in AML/CFT. Because TBML methods may be used not only to launder money, but also to finance international terrorism, facilitate weapons proliferation, and conceal and transport weapons of mass destruction (WMDs), this article proposes a far-reaching solution—that those in the international supply chain be required by law to adopt AML/CFT safeguards to protect their businesses, including filing suspicious activity reports, identifying their customers, and designating an AML/CFT compliance officer.

You do not have access to this content

Michael Tanji

From the start of the commercial Internet, and in the virtual environments that preceded it, computer and network technology have been used to circumvent copyright and facilitate piracy and illicit trade. Today, the pervasive presence of computing devices and the near ubiquity of Internet connectivity has made the problem worse in both scope and scale. The Internet is an ideal medium for such activity because it allows individuals to communicate globally and with a degree on anonymity and privacy sufficient to thwart all but the most intensive and expansive law enforcement efforts. Depending on the type of crime you want to commit, becoming an online criminal is a simple “point-and-click” task, and extremely cost-effective. Serious dealers in illegal content and contraband alike make finding and procuring their products just as simple and easy as legitimate manufacturers and retailers, making it difficult for some consumers to understand that they are participating in a crime. It costs very little to produce a web site that looks and feels completely legitimate. Web site templates can be developed for just a few dollars. If you cannot or do not want to do any work yourself, a web site developer in India can cost as little as $10 per hour. Companies like Squarespace allow you to not only create but also host web sites for less than $200 per year All a criminal has to do is cut-and-paste product descriptions into a template, upload pictures of their merchandise (or copy them from the manufacture’s site), and they are in business.

You do not have access to this content

Akino Chikada and Anil Gupta

The internet’s tremendous reach and economies of scale have revolutionized the way brands engage with customers and drive revenue. Companies in almost every industry have embraced the internet and e-commerce to grow their businesses and their brands; but so have fraudsters, counterfeiters, cybercriminals and other brand abusers. The digital world offers a sizable opportunity for fraudulent entities to hijack reputable brands for their own financial gain – and their tactics are becoming more and more sophisticated. Brands face a wide range of threats that can have a damaging impact on their reputation and customer trust, from counterfeiting and brand-associated phishing to content piracy and pay-per-click advertising scams. Fraudsters continue to leverage new and emerging channels, including social media outlets and mobile platforms, and are becoming adept at disguising their activity in hard-to-track areas of the internet.

You do not have access to this content

Peggy E. Chaudhry

The deep web hosts darknet marketplaces that sell a variety of wares, such as narcotics and weapons, and is testimony to the growth of illicit trade on the internet. The challenge of websites that host digital content piracy is exacerbated through linkages to a variety of malware schemes that have created a lucrative crimeware economy. Digital thieves are luring unsuspecting consumers as digital bait to derive profits from a variety of malware schemes, such as ransomware and malvertising. The hijacking of computers to gain access to their digital content so that it can then be ransomed back to consumers or organizations is considered to be one of the leading threats of internet crime. Malvertising schemes are plaguing the interactive advertising business—criminals are reaping profits by posting legitimate advertisements at content theft sites or using an army of botnets to fake advertising traffic. A variety of stratagems are evolving to curb this illicit trade by way of fostering multi-lateral enforcement tactics; updating legislation to circumvent this type of crime on the internet; training digital savvy citizens; and creating private-sector remedies.

You do not have access to this content

Stefano Betti

The chapter highlights some challenges and constraints that the law enforcement community faces when addressing illicit trade as a distinctive phenomenon, framing the discussion within the paradigm of organized crime today and current perceptions of illicit trade among practitioners. Notably, the discussion centers on advocating a change in cultural attitudes as a pre-requisite for effective law enforcement action. In addition, a detailed overview of the four major paths that could be followed to create useful deterrents against illicit trade is provided. Those paths include: legislative reform, notably to ensure that appropriate penalties are applied; the use of organized crime legislation in illicit trade related investigations; systematic resort to criminal justice treaties as global legal tools to facilitate the international exchange of evidence, in particular the UN Convention against Transnational Organized Crime; and using more resources on intelligence-driven investigations and preventive criminal proceedings for the purpose of disrupting illicit trade operations “in the making”. Each path is considered as an integral part of a coordinated policy and law enforcement based strategy.

This content is available to you

Peggy E. Chaudhry