Results for ' fraud'

82 found
Order:
  1. Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering” (Sha Zhu Pan, 杀猪盘).Jack Whittaker, Suleman Lazarus & Taidgh Corcoran - 2024 - Journal of Economic Criminology 3.
    This is a theoretical treatment of the term "Sha Zhu Pan" (杀猪盘) in Chinese, which translates to “Pig-Butchering” in English. The article critically examines the propagation and validation of "Pig Butchering," an animal metaphor, and its implications for the dehumanisation of victims of online fraud across various discourses. The study provides background information about this type of fraud before investigating its theoretical foundations and linking its emergence to the dehumanisation of fraud victims. The analysis highlights the disparity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Racial Fraud and the American Binary.Kevin J. Harrelson - 2022 - Eidos. A Journal for Philosophy of Culture 6 (3):44-61.
    In response to recent controversies about racial transitioning, I provide an argument that deceptions about ancestry may sometimes constitute fraud. In order to arrive at this conclusion, I criticize the arguments from analogy made famous by Rebecca Tuvel and Christine Overall. My claim is that we should not think of racial transitioning as similar to gender transitioning, because different identity groups possess different kinds of obstacles to entry. I then provide historical surveys of American racial categories and the various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. A FRAUD PREVENTION POLICY: ITS RELEVANCE AND IMPLICATION AT A UNIVERSITY OF TECHNOLOGY IN SOUTH AFRICA.Amelia Rorwana, Robertson K. Tengeh & Tichaona B. Musikavanhu - 2015 - Journal of Governance and Regulation 4 (3):212-221.
    Using research grants administrators and their clients (academic researchers) as the lens, this paper investigated the relevance and implication of a fraud prevention policy at a University of Technology (UoT) in South Africa. The paper adopted a quantitative approach in which closed-ended questions were complemented by open-ended questions in the survey questionnaire in the attempt to capture the perceptions of both research grants administrators and their clients on the relevance and implications of a fraud and irregularity prevention policy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Data frauds, health risks, and the growing question of ethics during the COVID-19 pandemic.Vuong Quan-Hoang, Le Tam-Tri & Nguyen Minh-Hoang - manuscript
    In this essay, we advocate that the issue of health data ethics should no longer be considered on the level of individual scientists or research labs, but rather as a problem involving all stakeholders, from publishers, funders, ethical committees to governments, for the sake of research integrity.
    Download  
     
    Export citation  
     
    Bookmark  
  5. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  39
    The Complex relationship between fraud and technology - Should we ignore or regulate online platforms? (12th edition).Jack Mark Whittaker - 2024 - Public Sector Counter Fraud Journal 1 (12):21-22.
    This short article introduces the notion that there is a historical relationship between technology and fraud, that two opposing viewpoints argue whether technology is or is not capable of harm, and lastly that platforms can in fact benefit from fraudsters operating on them parasitically.
    Download  
     
    Export citation  
     
    Bookmark  
  7. Making matters of fraud: Sociomaterial technology in the case of Hwang and Schatten.Buhm Soon Park - 2020 - History of Science 58 (4):393-416.
    This paper revisits the “Hwang case,” which shook Korean society and the world of stem cell research in 2005 with the fraudulent claim of creating patient-specific embryonic stem cells. My goal is to overcome a human-centered, Korea-oriented narrative, by illustrating how materials can have an integral role in the construction and judgment of fraud. To this end, I pay attention to Woo Suk Hwang’s lab at Seoul National University as a whole, including human and nonhuman agents, that functioned as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. All (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Principlist Pandemics: On Fraud Ethical Guidelines and the Importance of Transparency.Jonathan Lewis & Udo Schuklenk - 2022 - In Michael Boylan (ed.), Ethical Public Health Policy Within Pandemics: Theory and Practice in Ethical Pandemic Administration. Cham: Springer. pp. 131-148.
    The COVID-19 pandemic has coincided with the proliferation of ethical guidance documents to assist public health authorities, health care providers, practitioners and staff with responding to ethical challenges posed by the pandemic. Like ethical guidelines relating to infectious disease that have preceded them, what unites many COVID-19 guidance documents is their dependency on an under-developed approach to bioethical principlism, a normative framework that attempts to guide actions based on a list of prima facie, unranked ethical principles. By situating them in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. In support of fraud trials without a jury.Sally Serena Ramage - 2005 - The Criminal Lawyer 156 (156):1-176.
    The United Kingdom's Parliamentary Bill 'Fraud Trials (Without a Jury) 2007', failed. Nevertheless, fraud trials without a jury do take place and there is much evidence to support this. Today the UK still does not support fraud trials without a jury, even though fraud in the UK today is the highest amount of fraud globally. The longer version of this paper is submitted here since it has become urgent that UK fraud trials be examined (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Quote- and Citation Fraud at the UiO, Chapter 2; with 'The learning of value' and the connection to mob-bullying in our schools (by Dr. Kai Sørfjord) 2016.Kai Soerfjord - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  13. Quote- and Citation fraud at the University of Oslo (UiO), Chapter 2.Kai Soerfjord - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  14. Is there ever an obligation to commit welfare fraud?Stephen D’Arcy - 2008 - Journal of Value Inquiry 42 (3):377-387.
    All things considered, there are many public assistance recipients for whom there are compelling moral reasons to engage in welfare fraud. For many people, failure to defraud the welfare system, should they find themselves in a position to do so with impunity, would constitute a serious moral offense. This conclusion seems to fly in the face of prevailing notions of common sense. But this is misleading, since it is at the same time implied by principles that are widely embraced, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. “Paintings Can Be Forged, But Not Feeling”: Vietnamese Art—Market, Fraud, and Value.Quan-Hoang Vuong, Manh-Tung Ho, Hong-Kong T. Nguyen, Thu-Trang Vuong & Ho Manh Toan - 2018 - Arts 7 (4):62.
    A work of Vietnamese art crossed a million-dollar mark in the international art market in early 2017. The event was reluctantly seen as a sign of maturity from the Vietnamese art amidst the many existing problems. Even though the Vietnamese media has discussed the issues enthusiastically, there is a lack of literature from the Vietnamese academics examining the subject, and even rarer in from the market perspective. This paper aims to contribute an insightful perspective on the Vietnamese art market, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Voodoo science: the road from foolishness to fraud.Luciano Floridi - 2001 - In What the Sokal Hoax Ought to Teach Us.
    This article is a review of R.L Park's Voodoo Science: The Road from Foolishness to Fraud.
    Download  
     
    Export citation  
     
    Bookmark  
  17. How to Discriminate between Experts and Frauds: Some Problems for Socratic Peirastic.Jyl Gentzler - 1995 - History of Philosophy Quarterly 12 (3):227 - 246.
    It has often been noted that Socratic cross-examination is problematic as a method of inquiry, i.e., as a method for 'acquiring' knowledge. Rarely has it been noticed that there are problems with cross-examination when used for the purposes of 'testing' for knowledge. In the 'Charmides', Socrates commits himself to the following principle: In order to discriminate between the person who knows and the person who does not know the subject matter covered by a particular discipline (technê), one must have mastered (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  18. ‘Duped Fathers’, ‘Cuckoo Children’, and the Problem of Basing Fatherhood on Biology: A Philosophical Analysis.Daniela Cutas & Anna Smajdor - 2020 - In Assistierte Reproduktion mit Hilfe Dritter. Medizin - Ethik - Psychologie - Recht. Berlin, Heidelberg:
    Who is a child’s father? Is it the man who raised her, or the one whose genes she carries—or both? We look at the view that men who have raised children they falsely believed to be ‘their own’ have been victims of a form of fraud or are ‘false fathers’. We consider the question of who has been harmed in such cases, and in what the harm consists. We use conceptual analysis, a philosophical method of investigating the use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Predicting Audit Risk Using Neural Networks: An In-depth Analysis.Dana O. Abu-Mehsen, Mohammed S. Abu Nasser, Mohammed A. Hasaballah & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):48-56.
    Abstract: This research paper presents a novel approach to predict audit risks using a neural network model. The dataset used for this study was obtained from Kaggle and comprises 774 samples with 18 features, including Sector_score, PARA_A, SCORE_A, PARA_B, SCORE_B, TOTAL, numbers, marks, Money_Value, District, Loss, Loss_SCORE, History, History_score, score, and Risk. The proposed neural network architecture consists of three layers, including one input layer, one hidden layer, and one output layer. The neural network model was trained and validated, achieving (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Disclosure and Consent to Medical Research Participation.Danielle Bromwich & Joseph Millum - 2013 - Journal of Moral Philosophy 10 (4):195-219.
    Most regulations and guidelines require that potential research participants be told a great deal of information during the consent process. Many of these documents, and most of the scholars who consider the consent process, assume that all this information must be disclosed because it must all be understood. However, a wide range of studies surveying apparently competent participants in clinical trials around the world show that many do not understand key aspects of what they have been told. The standard view (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  21. Police Deception and Dishonesty – The Logic of Lying.Luke William Hunt - 2024 - New York: Oxford University Press.
    Cooperative relations steeped in honesty and good faith are a necessity for any viable society. This is especially relevant to the police institution because the police are entrusted to promote justice and security. Despite the necessity of societal honesty and good faith, the police institution has embraced deception, dishonesty, and bad faith as tools of the trade for providing security. In fact, it seems that providing security is impossible without using deception and dishonesty during interrogations, undercover operations, pretextual detentions, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian cybercriminals' (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  23. Good Faith as a Normative Foundation of Policing.Luke William Hunt - 2023 - Criminal Law and Philosophy 17 (3):1-17.
    The use of deception and dishonesty is widely accepted as a fact of life in policing. This paper thus defends a counterintuitive claim: Good faith is a normative foundation for the police as a political institution. Good faith is a core value of contracts, and policing is contractual in nature both broadly (as a matter of social contract theory) and narrowly (in regard to concrete encounters between law enforcement officers and the public). Given the centrality of good faith to policing, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Violation Imperative.La Shun L. Carroll - 2022 - Eliva Press.
    Allegations of fraud involving falsification as research misconduct may result in severe consequences for those convicted. The focus of this article is the Public Health Service’s (PHS) definition of falsification . A well-articulated revised definition is required for veritable instances of falsification as misconduct to be consistently identified and potentially offer a framework for elucidation. A philosophical critique of the explicit definition is undertaken to determine what comprises falsification at its core, which could substantially reduce the number of allegations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Case analysis: Enron; Ethics, social responsibility, and ethical accounting as inferior goods?Rashid Muhammad Mustafa - 2020 - Journal of Economics Library 7 (2):98-105.
    In 2001 soon after the Asian Crises of 1997-1998, the DotcomBubble, 9/11, the Enron crises triggered a fraud crisis in Wall Street that impacted the market to the core. Since then scandals such as the Lehman Brothers and WorldCom in 2007-2008 and the Great Recession have surpassed it, Enron still remains one of the most important cases of fraudulent accounting. In 2000’s even though the financial industry had become highly regulated, deregulation of the energy industry allowed companies to place (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Conductas no éticas en la investigación científica: prevalencia, causas asociadas y estrategias de prevención. Una revisión sistemática.Sandra Reyes-Carrillo & Daniel Eudave-Muñoz - 2022 - Revista Innovaciones Educativas 24 (SI):105-125.
    El plagio ha sido objeto de investigaciones desde hace algunos años; sin embargo, ha sido estudiado principalmente en el alumnado de diferentes niveles educativos, aun cuando es una práctica que se manifiesta también en la investigación científica. Por ello, este artículo parte de responder: ¿Cuál es la prevalencia del plagio entre investigadores? ¿Cuáles son las principales causas asociadas a su comisión? ¿Qué estrategias se emplean para prevenirlo? Se realizó una revisión sistemática de literatura. Un total de 25 documentos fueron evaluados, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Neural Network-Based Audit Risk Prediction: A Comprehensive Study.Saif al-Din Yusuf Al-Hayik & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):43-51.
    Abstract: This research focuses on utilizing Artificial Neural Networks (ANNs) to predict Audit Risk accurately, a critical aspect of ensuring financial system integrity and preventing fraud. Our dataset, gathered from Kaggle, comprises 18 diverse features, including financial and historical parameters, offering a comprehensive view of audit-related factors. These features encompass 'Sector_score,' 'PARA_A,' 'SCORE_A,' 'PARA_B,' 'SCORE_B,' 'TOTAL,' 'numbers,' 'marks,' 'Money_Value,' 'District,' 'Loss,' 'Loss_SCORE,' 'History,' 'History_score,' 'score,' and 'Risk,' with a total of 774 samples. Our proposed neural network architecture, consisting of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Sex By Deception.Berit Brogaard - 2022 - In Manuel Vargas & John Doris (eds.), The Oxford Handbook of Moral Psychology. Oxford, U.K.: Oxford University Press. pp. 683-711.
    In this paper I will use sex by deception as a case study for highlighting some of the most tricky concepts around sexuality and moral psychology, including rape, consensual sex, sexual rights, sexual autonomy, sexual individuality, and disrespectful sex. I begin with a discussion of morally wrong sex as rooted in the breach of five sexual liberty rights that are derived from our fundamental human liberty rights: sexual self-possession, sexual autonomy, sexual individuality, sexual dignity and sexual privacy. I then argue (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  29. Artificial intelligence crime: an interdisciplinary analysis of foreseeable threats and solutions.Thomas C. King, Nikita Aggarwal, Mariarosaria Taddeo & Luciano Floridi - 2020 - Science and Engineering Ethics 26 (1):89-120.
    Artificial intelligence research and regulation seek to balance the benefits of innovation against any potential harms and disruption. However, one unintended consequence of the recent surge in AI research is the potential re-orientation of AI technologies to facilitate criminal acts, term in this article AI-Crime. AIC is theoretically feasible thanks to published experiments in automating fraud targeted at social media users, as well as demonstrations of AI-driven manipulation of simulated markets. However, because AIC is still a relatively young and (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  30. Ethics of Artificial Intelligence.Stefan Buijsman, Michael Klenk & Jeroen van den Hoven - forthcoming - In Nathalie Smuha (ed.), Cambridge Handbook on the Law, Ethics and Policy of AI. Cambridge University Press.
    Artificial Intelligence (AI) is increasingly adopted in society, creating numerous opportunities but at the same time posing ethical challenges. Many of these are familiar, such as issues of fairness, responsibility and privacy, but are presented in a new and challenging guise due to our limited ability to steer and predict the outputs of AI systems. This chapter first introduces these ethical challenges, stressing that overviews of values are a good starting point but frequently fail to suffice due to the context (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Not What I Agreed To: Content and Consent.Emily C. R. Tilton & Jonathan Ichikawa - 2021 - Ethics 132 (1):127–154.
    Deception sometimes results in nonconsensual sex. A recent body of literature diagnoses such violations as invalidating consent: the agreement is not morally transformative, which is why the sexual contact is a rights violation. We pursue a different explanation for the wrongs in question: there is valid consent, but it is not consent to the sex act that happened. Semantic conventions play a key role in distinguishing deceptions that result in nonconsensual sex (like stealth condom removal) from those that don’t (like (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  32. Institutional Degeneration of Science.Jüri Eintalu - 2021 - Philosophy Study 11 (2):116-123.
    The scientificity of the research should be evaluated according to the methodology used in the study. However, these are usually the research areas or the institutions that are classified as scientific or non-scientific. Because of various reasons, it may turn out that the scientific institutions are not producing science, while the “non-scientists” are doing real science. In the extreme case, the official science system is entirely corrupt, consisting of fraudsters, while the real scientists have been expelled from academic institutions. Since (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Exploratory hypothesis tests can be more compelling than confirmatory hypothesis tests.Mark Rubin & Chris Donkin - 2022 - Philosophical Psychology.
    Preregistration has been proposed as a useful method for making a publicly verifiable distinction between confirmatory hypothesis tests, which involve planned tests of ante hoc hypotheses, and exploratory hypothesis tests, which involve unplanned tests of post hoc hypotheses. This distinction is thought to be important because it has been proposed that confirmatory hypothesis tests provide more compelling results (less uncertain, less tentative, less open to bias) than exploratory hypothesis tests. In this article, we challenge this proposition and argue that there (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Consumer Boycotts as Instruments for Structural Change.Valentin Beck - 2018 - Journal of Applied Philosophy 36 (4):543-559.
    Consumer boycotts have become a frequent form of social protest in the digital age. The corporate malpractices motivating them are varied, including environmental pollution, lack of minimum labour standards, severe mistreatment of animals, lobbying and misinformation campaigns, collaboration or complicity with illegitimate political regimes, and systematic tax evasion and tax fraud. In this article, I argue that organised consumer boycotts should be regarded as a legitimate and purposeful instrument for structural change, provided they conform to a number of normative (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Theories of whistleblowing.Emanuela Ceva & Michele Bocchiola - 2020 - Philosophy Compass 15 (1):e12642.
    Whistleblowing” has entered the scholarly and the public debate as a way of describing the exposure by the member of an organization of episodes of corruption, fraud, or general abuses of power within the organization. We offer a critical survey of the main normative theories of whistleblowing in the current debate in political philosophy, with the illustrative aid of one of the epitomic figures of a whistleblower of our time: Edward Snowden. After conceptually separating whistleblowing from other forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  36. The Law and Ethics of K Street.Daniel T. Ostas - 2007 - Business Ethics Quarterly 17 (1):33-63.
    This article explores the law and ethics of lobbying. The legal discussion examines disclosure regulations, employment restrictions,bribery laws, and anti-fraud provisions as each applies to the lobbying context. The analysis demonstrates that given the social value placed on the First Amendment, federal law generally affords lobbyists wide latitude in determining who, what, when, where, and how to lobby.The article then turns to ethics. Lobbying involves deliberate attempts to effect changes in the law. An argument is advanced that because law (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  37. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, cyber‐fraud, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  38.  27
    "The show must go on-Trial in absence".Sally Serena Ramage - 2024 - The Criminal Lawyer 1 (261):1-14.
    A defendant's absence need not be a bar to continuation of his trial for fraud. The.
    Download  
     
    Export citation  
     
    Bookmark  
  39. Fraudulent Advertising: A Mere Speech Act or a Type of Theft?Pavel Slutskiy - unknown - Libertarian Papers 8.
    Libertarian philosophy asserts that only the initiation of physical force against persons or property, or the threat thereof, is inherently illegitimate. A corollary to this assertion is that all forms of speech, including fraudulent advertising, are not invasive and therefore should be considered legitimate. On the other hand, fraudulent advertising can be viewed as implicit theft under the theory of contract: if a seller accepts money knowing that his product does not have some of its advertised characteristics, he acquires the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Objectivity for the research worker.Noah van Dongen & Michał Sikorski - 2021 - European Journal for Philosophy of Science 11 (3):1-25.
    In the last decade, many problematic cases of scientific conduct have been diagnosed; some of which involve outright fraud others are more subtle. These and similar problems can be interpreted as caused by lack of scientific objectivity. The current philosophical theories of objectivity do not provide scientists with conceptualizations that can be effectively put into practice in remedying these issues. We propose a novel way of thinking about objectivity for individual scientists; a negative and dynamic approach.We provide a philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. United Kingdom’s healthcare corruption in perspective.Sally Serena Ramage - 2023 - The Criminal Lawyer 258 (258):2-24.
    Corruption deprives people of access to health care and can lead to the wrong treatments being administered. Drug counterfeiting, facilitated by corruption, kills en masse. Cases are recorded of water being substituted for life-saving adrenaline and of active ingredients being diluted by counterfeiters, triggering drug-resistant strains of malaria, tuberculosis and HIV. The poor are disproportionately affected by corruption in the health sector, and cannot afford to pay for private alternatives where corruption has depleted public health services. Analysis of corruption in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  35
    How to Identify Norms, Laws and Regulations That Facilitate Illicit Financial Flows and Related Financial Crimes.Tiago Cardao-Pito - forthcoming - Journal of Money Laundering Control.
    Purpose: Illicit financial flows are targeted by the United Nations’ (UN) Sustainable Development Goals (SDGs). However, these illicit flows are not entirely understood. Furthermore, they can benefit from economic norms, laws, and regulations that lack mechanisms to detect and penalize them. This paper investigates whether a recent test, the embezzler test, can be used to identify regulatory architectures that facilitate illicit financial flows and related financial crimes. -/- Design/methodology/approach: To develop a more advanced version of the embezzler test in terms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. The opportunities and challenges of blockchain in the fight against government corruption.Nikita Aggarwal & Luciano Floridi - 2018 - 19th General Activity Report (2018) of the Council of Europe Group of States Against Corruption (GRECO).
    Broadly defined, government corruption is the abuse of public power for private gain. It can assume various forms, including bribery, embezzlement, cronyism, and electoral fraud. At root, however, government corruption is a problem of trust. Corrupt politicians abuse the powers entrusted to them by the electorate (the principal-agent problem). Politicians often resort to corruption out of a lack of trust that other politicians will abstain from it (the collective action problem). Corruption breeds greater mistrust in elected officials amongst the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Justice and the Law.Thaddeus Metz - 2004 - In Christopher Roederer & Darrel Moellendorf (eds.), Jurisprudence. Juta. pp. 382-411.
    This chapter discusses major theories of domestic justice in the context of South African Constitutional, statutory and case law. It begins by considering when it is permissible for legislators to restrict civil liberty. South Africa's Parliament has criminalised prostitution, liquor sales on Sundays and marijuana use, actions that few liberals would say should be illegal. However, South African law permits abortion, gambling and homosexual relationships, which many conservatives would criminalise. Is there any deep inconsistency here? Should South Africa become more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. U.S.Justice Department Announces Global Resolution of Criminal and Civil Investigations with Opioid Manufacturer Purdue Pharma and Civil Settlement with Members of the Sackler Family.Ramage Sally - forthcoming - Criminal Law News:17-24.
    Purdue Pharma was being investigated by United States Civil and Criminal compliance agencies for many years and a conclusion has now been reached. Although successful , this author feels that such extremely serious corporate frauds must also punish senior individual executives with long jail sentences -in this case-corporate manslaughter.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. The use of confidentiality and anonymity protections as a cover for fraudulent fieldwork data.M. V. Dougherty - 2021 - Research Ethics 17 (4):480-500.
    Qualitative fieldwork research on sensitive topics sometimes requires that interviewees be granted confidentiality and anonymity. When qualitative researchers later publish their findings, they must ensure that any statements obtained during fieldwork interviews cannot be traced back to the interviewees. Given these protections to interviewees, the integrity of the published findings cannot usually be verified or replicated by third parties, and the scholarly community must trust the word of qualitative researchers when they publish their results. This trust is fundamentally abused, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. How Abstract Liberty Relates to Private Property: a One-Page Outline.J. C. Lester - manuscript
    Libertarianism—and classical liberalism generally—entails (or presupposes) a specific, but implicit, conception of liberty. Imagine two lists of property-rights: one list is all those that currently appear to be libertarian (self-ownership, property acquired by use of natural resources, property acquired by consensual exchange, etc.); the other list is all those that currently appear not to be libertarian (aggressively imposed slavery, property acquired by theft or fraud, property acquired by coerced transfers due to welfare claims, etc.). What determines into which list (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Political Bald-Faced Lies are Performative Utterances.Susanna Melkonian-Altshuler - forthcoming - In Adam Podlaskowski & Drew Johnson (eds.), Truth 20/20. Synthese Library.
    Sometimes, political bald-faced lies pass for truth. That is, certain groups of people behave according to them – behave as if the political bald-faced lies were true. How can this phenomenon be explained? I argue that to explain it we need to take political bald-faced lies to be performative utterances whose goal is to bring about a worldly state of affairs just in virtue of making the utterance. When the former US-President tweeted ‘we won the election’, people stormed Capitol Hill (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Ethics of Transactions in an Unjust World.J. Millum - 2016 - In K. Zeiler & E. Malmqvist (eds.), Bioethics and Border Crossing: Perspectives on Giving, Selling and Sharing Bodies. Routledge: Oxon. pp. 185-196.
    In this paper I examine the ethics of benefit-sharing agreements between victims and beneficiaries of injustice in the context of trans-national bodily giving, selling, and sharing. Some obligations are the same no matter who the parties to a transaction are. Prohibitions on threats, fraud and harm apply universally and their application to transactions in unjust contexts is not disputed. I identify three sources of obligations that are affected by unjust background conditions. First, power disparities may illegitimately influence transactions in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Vampires, Werewolves, and Economic Exploitation.George E. Panichas - 1981 - Social Theory and Practice 7 (2):223-242.
    For Marx, capitalism depends upon and perpetuates a system of relationships whereby members of one class of persons, capitalists, enjoys extensive and pervasive social and economic advantages over others. But on Marx’s analysis, this system of being-taken-advantage-of—this system of economic exploitation—is not to be understood by appeal to discrete incidents of fraud, bad deals, theft, or under-remuneration. Rather, the central contention of Marx’s analysis, the contention analyzed, developed, and evaluated here, is that economic exploitation is class exploitation, a phenomenon (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 82