Risk assessments on trees in urban areas and roadside plantings have become common practice and a large body of information exists on qualitative aspects on the risks of tree failure. Quantitative analysis of financial damage due to tree failure is generally lacking. The objective of this paper is to determine the amount of tree failure related property damage and to derive possible trends in the number of cases and monetary claims and compensations. This paper presents the analysis of 1610 observations on urban tree failure in the Netherlands. The data originate from two different sources, i.e. jurisprudence (4% of the data) and 21 municipalities (96%). The data covers property damage in urban areas between the early sixties and 2010. Within municipalities, paid compensations due to tree failure are found to range from €0 to € 49,296 with an average of €2,244 per paid compensation. Results demonstrate a significant annual increase in tree failure as well as in paid compensations.
MULTIFILE
While criminality is digitizing, a theory-based understanding of the impact of cybercrime on victims is lacking. Therefore, this study addresses the psychological and financial impact of cybercrime on victims, applying the shattered assumptions theory (SAT) to predict that impact. A secondary analysis was performed on a representative data set of Dutch citizens (N = 33,702), exploring the psychological and financial impact for different groups of cybercrime victims. The results showed a higher negative impact on emotional well-being for victims of person-centered cybercrime, victims for whom the offender was an acquaintance, and victims whose financial loss was not compensated and a lower negative impact on emotional well-being for victims with a higher income. The study led to novel scientific insights and showed the applicability of the SAT for developing hypotheses about cybercrime victimization impact. In this study, most hypotheses had to be rejected, leading to the conclusion that more work has to be done to test the applicability of the SAT in the field of cybercrime. Furthermore, policy implications were identified considering the prioritization of and approach to specific cybercrimes, treatment of victims, and financial loss compensation.
MULTIFILE
From the article: "After 1993, the concept of strategic alignment is evaluated from the connection between IT and business to much broader definitions in which the connection between all business functions, horizontally and vertically, and later also with projects and stakeholders is mentioned. To achieve stategic alignment there must be a coordination between the strategy of organizations and those who contribute to the implementation of the strategy and the actual performance of an organization. This process is called Human Oriented Performance Management (HOPM). The HOPM model consists of four dimensions: strategy translation, information and visualization, dialogue and action orientation, and continues improvement and organizational learning. To measure the effect of strategic alignment a range of financial performance indicators are used. Based on a literature review this paper explores which financial performance indicators could be used to measure the effect of HOPM. The literature was selected over a period from 1996 – 2015. The research is not only focused on the top of the strategy map, but also on the cause-effect relationships in the strategy map. The underlying performance indicators in the strategy map can show on which figures the dialogue in the HOPM model about strategy implementation must be based. This dialogue is the input to action in which strategic alignment comes about. The goal of the research is to optimize this dialogue by looking for performance indicators that can show the effect of HOPM" The article is used for the course: 'corporate policy' minor MSMM (Masterclass Strategic Marketing Management).
DOCUMENT
This dissertation focuses on the question how money mules are recruited and which mechanisms play a role. Money mules are people who receive money from victims of online fraud. They are an indispensable link in the commission of financial-economic cybercrimes, such as phishing and bank helpdesk fraud, because they break the financial trail from victims to core members. The crucial role of money mules in the crime script and the possible consequences for young money mules themselves make them a valuable target group for scientific research. Almost no empirical research has been conducted into money mules and the involvement mechanisms of cybercrime. However, this knowledge is necessary for the development and application of prevention measures: interventions aimed at money mules disrupt the execution of various forms of online fraud, which can reduce victimization of cybercrime among citizens and businesses. In total, the dissertation consists of six empirical chapters, in which different research methods were used. This includes questionnaires and expert interviews, but also more unique and innovative methods such as online field experiments and analysis of police investigations into cybercriminal networks. The dissertation shows that money mules - still - form a crucial link in the world of financial-economic cybercrime. It is clear that this phenomenon manifests itself in different ways over time: online bank accounts, international bank accounts and crypto wallets are currently popular among cybercriminal networks because they offer even more anonymity than bank accounts at large traditional banks. This also means that money mules are also recruited for their identification cards instead of their bank card, which offenders use to open up accounts for themselves. It can be concluded that the social environment of money mules forms a criminal opportunity structure. Money mules are approached via-via and actively addressed; online on social media such as Instagram and Telegram but also offline on the street, at school or at the metro station. Social relationships therefore offer cybercriminal networks access to co-offenders, including money mules, and can explain why young people become involved in the world of cybercrime. Financial motivations play a role here, because money mules often look up to the luxurious lifestyle of criminals and give up bank account details in exchange for compensation. Risk perceptions regarding the likelihood of being caught and the consequences of money muling are low and money mules justify the criminal behavior. In addition to financial considerations, some recruiters also exert pressure or even threaten with violence. This reflects the heterogeneous nature of the target group and makes it clear that various involvement mechanisms play a role.
LINK
Financial constraints and risk taking are two well-established determinants of firm performance, however, no research analyzes how these variables are connected in the context of a high risk environment. Using data from microfinance clients in Tanzania, we derive a novel financial constraints measure and incorporate a psychometric risk taking scale. Results confirm the importance of access to finance and risk attitudes for business development. Also, we provide preliminary evidence for an interaction between financial constraints and risk taking. Financial constraints “throw sand in the wheels” and protect risk taking entrepreneurs from the negative impact of risk taking on microenterprise performance.
DOCUMENT
Dutch National Sports Organizations (NSFs) is currently experiencing financial pressures. Two indications for this are described in this paper i.e. increased competition in the sports sector and changes in subsidy division. Decreasing incomes from subsidies can be compensated with either increasing incomes from a commercial domain or increasing incomes from member contributions. This latter solution is gaining interest as a solution for the uncertainties. Many NSFs have therefore participated in a special marketing program in order to enlarge their marketing awareness and create a marketing strategy, in order to (re)win market share on the sports participation market and gain a more stable financial situation. This paper introduces my research related to the introduction of marketing techniques within NSFs and the change-over to become market oriented. An overview of existing literature about creating marketing strategies, their implementation, and market orientation is given. This outline makes obvious that the existing literature is not sufficient for studying the implementation of marketing techniques and market orientation within NSFs. Therefore, it shows the scientific relevance of my research. The paper concludes with the chosen research methodology.
DOCUMENT
Aim. To report the expectations and experiences of general practitioners and practice nurses regarding the U-CARE programme, to gain a better understanding of the barriers and facilitators in providing proactive, structured care to frail older people and to determine whether implementation is feasible. Background. Care for older patients with complex care needs in primary care is fragmented, reactive and time consuming. A structured, proactive care programme was developed to improve physical functioning and quality of life in frail older patients. Design. An explanatory mixed-methods study nested in a cluster-randomized trial. Methods. The barriers to and needs for the provision of structured, proactive care, and expectations regarding the U-CARE programme were assessed with prequestionnaires sent to all participating general practitioners (n = 32) and practice nurses (n = 21) in October 2010. Postquestionnaires measured experiences with the programme after 5 months. Twelve months later, focus group meetings were conducted. Results. Practice nurses and general practitioners reported that it was difficult to provide proactive and structured care to older patients with multi-morbidity, different cultural backgrounds and low socioeconomic status. Barriers were a lack of time and financial compensation. Most general practitioners and practice nurses indicated that the programme added value for the coordination of care and allowed them to provide structured care. Conclusion. This explanatory mixed-methods study showed that general practitioners and practice nurses perceived the U-CARE programme as feasible in general practice. A transition was made from reactive, ad hoc care towards a proactive and preventive care approach
DOCUMENT
In dit artikel worden de mogelijke gevolgen belicht van de introductie van nieuwe en bestaande toepassingen van Bitcoin-technologie. De transnationale, decentrale en gedistribueerde peer-to-peer-structuur van de Bitcoin-technologie en van nieuwe toepassingen hiervan, hebben de potentie om bestaande sociale relaties en instituties te ontregelen. Het krachtenveld waarin maatschappelijke actoren staan kan hierdoor uit balans worden gebracht. De meest radicale van deze nieuwe technologieën is Ethereum. Met name het concept van de Digital Autonomous Organisation (DOA) heeft mogelijkerwijs verregaande consequenties. Ethereum is een ‘contract validating and enforcing system’, een gedistribueerd systeem dat een platform biedt voor autonome computerprogramma’s die in staat zijn om zelfstandig overeenkomsten met rechtspersonen en andere DOA’s aan te gaan en te ontbinden. Ik richt mij op de mogelijkheden van deze toepassingen als nieuwe platformen voor International Financial (Cyber) Crime.
DOCUMENT
Als gevolg van nieuwe wetgeving zoals Sarbanes-Oxley en gedragscodes als die van de commissie Tabaksblat is het de expliciete verantwoordelijkheid van de directie om te zorgen voor een adequaat en effectief risicomanagement en intern beheersingssysteem. Het is opvallend dat deze nieuwe interne-controlevereisten de kredietcrisis niet hebben kunnen voorkomen in een zo streng gereguleerde bedrijfstak als die van de financiële dienstverlening. De grote vraag is dan ook hoe dit allemaal heeft kunnen gebeuren en welke mogelijke lessen er te trekken zijn.
DOCUMENT
There are three volumes in this body of work. In volume one, we lay the foundation for a general theory of organizing. We propose that organizing is a continuous process of ongoing mutual or reciprocal influence between objects (e.g., human actors) in a field, whereby a field is infinite and connects all the objects in it much like electromagnetic fields influence atomic and molecular charged objects or gravity fields influence inanimate objects with mass such as planets and stars. We use field theory to build what we now call the Network Field Model. In this model, human actors are modeled as pointlike objects in the field. Influence between and investments in these point-like human objects are explained as energy exchanges (potential and kinetic) which can be described in terms of three different types of capital: financial (assets), human capital (the individual) and social (two or more humans in a network). This model is predicated on a field theoretical understanding about the world we live in. We use historical and contemporaneous examples of human activity and describe them in terms of the model. In volume two, we demonstrate how to apply the model. In volume 3, we use experimental data to prove the reliability of the model. These three volumes will persistently challenge the reader’s understanding of time, position and what it means to be part of an infinite field. http://dx.doi.org/10.5772/intechopen.99709
DOCUMENT