To read this content please select one of the options below:

Rogue insiders, signature loopholes, and fraud rings: Lessons learned by a Chinese B2B mogul

Chengqi (Chen) Guo (Computer Information Systems & Business Analytics, James Madison University, Harrisonburg, Virginia, USA)
Xiaorui Hu (Decision Sciences and Information Technology Management, Saint Louis University, Saint Louis, Missouri, USA)

International Journal of Accounting & Information Management

ISSN: 1834-7649

Article publication date: 19 October 2012

1389

Abstract

Purpose

The purpose of this paper is to report the findings and lessons learned from a case study that is based on Alibaba's business‐to‐business (B2B) fraud in China. The influence of such incidents and post‐hoc solutions are research worthy in today's booming digital business world.

Design/methodology/approach

The paper uses a case study approach and practice‐driven method that rely on user behaviors, corporate policies, and financial data. The taxonomic framework of online fraud and corresponding countermeasures arise from digital forensic reports, policy reviews, data analysis, and a literature review.

Findings

The key findings are indigenous to the Chinese B2B landscape, yet they help international stakeholders understand and address fraudulent issues. The paper finds beside the traditional customer‐based account signature, internal employees must be assigned their own signature systems to track malicious activities. Meanwhile, digital signature systems can be enhanced by reducing the record inter‐arrival time. Policy revisions are proposed to (e.g. offshore companies) lead to the decrease in the number of fraudulent incidents.

Originality/value

The paper extends existing understanding of online fraud by studying a Chinese case. The findings are timely and based on real world experience. Actual practices are discussed and evaluated. A range of fraudulent activities is reviewed in a comprehensive framework. The findings are important due to the public exposure and wide implications of such an incident. Also, this study reveals that fraud protection is an on‐going effort requiring a triangulation of technical artifacts, policy management, and operations management.

Keywords

Citation

Guo, C.(C). and Hu, X. (2012), "Rogue insiders, signature loopholes, and fraud rings: Lessons learned by a Chinese B2B mogul", International Journal of Accounting & Information Management, Vol. 20 No. 4, pp. 348-362. https://doi.org/10.1108/18347641211272704

Publisher

:

Emerald Group Publishing Limited

Copyright © 2012, Emerald Group Publishing Limited

Related articles