Search results

1 – 10 of 48
Article
Publication date: 8 December 2023

Oluwatoyin Esther Akinbowale, Polly Mashigo and Mulatu Fekadu Zerihun

The purpose of this study is to analyse cyberfraud in the South African banking industry using a multiple regression approach and develop a predictive model for the estimation and…

Abstract

Purpose

The purpose of this study is to analyse cyberfraud in the South African banking industry using a multiple regression approach and develop a predictive model for the estimation and prediction of financial losses due to cyberfraud.

Design/methodology/approach

To mitigate the occurrence of cyberfraud, this study uses the multiple regression approach to correlate the relationship between financial loss and cyberfraud activities. The cyberfraud activities in South Africa are classified into three, namely, digital banking application, online and mobile banking fraud. Secondary data that captures the rate of cyberfraud occurrences within these three major categories with their resulting financial losses were used for the multiple regression analysis that was carried out in the Statistical Package for Social Science (SPSS, 2022 environment).

Findings

The results obtained indicate that the South African financial institutions still incur significant financial losses due to cyberfraud perpetration. The two main independent variables used to estimate the magnitude of financial loss in the South Africa’s banking industry are online (internet) banking fraud (X2) and mobile banking fraud (X3). Furthermore, a multiple regression model equation was developed for the prediction of financial loss as a function of the two independent variables (X2 and X3).

Practical implications

This study adds to the literature on cyberfraud mitigation. The findings may promote the combat against cyberfraud in the South Africa’s financial institutions. It may also assist South Africa’s financial institutions to predict the financial loss that financial institutions can incur over time. It is recommended that South Africa’s financial institutions pay attention to these two key variables and mitigate any associated risks as they are crucial in determining their profitability.

Originality/value

Existing literature indicated significant financial losses to cyberfraud perpetration without establishing any relationship between the magnitude of losses incurred and the prevalent forms of cyberfraud. Thus, the novelty of this study lies in the analysis of cyberfraud in the South African banking industry using a multiple regression approach to link financial losses to the perpetration of the prevalent forms of cyberfraud. It also develops a predictive model for the estimation and projection of financial losses.

Details

Journal of Financial Crime, vol. 31 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 11 August 2023

Jacobus Gerhardus J. Nortje and Daniel Christoffel Myburgh

This paper aims to identify impediments, discuss impediments and make recommendations for the impediments during the execution of a search and seizure warrant for digital evidence…

Abstract

Purpose

This paper aims to identify impediments, discuss impediments and make recommendations for the impediments during the execution of a search and seizure warrant for digital evidence in South African criminal cases.

Design/methodology/approach

The discussion of this article, the second article of two, focuses on a literature review of international and local impediments identified in case law and published research literature and how it is approached in various jurisdictions.

Findings

This study found that impediments identified and addressed internationally during the execution of a search and seizure warrant for digital evidence are relevant to South African criminal cases and still need to be addressed during the execution of a search and seizure warrant for digital evidence in South African criminal cases.

Research limitations/implications

Although searches and seizures for digital evidence are relevant to civil, regulatory and criminal investigations, this study focuses on the search and seizure for digital evidence in criminal matters with an emphasis on the provisions of the Criminal Procedure Act 51 of 1977 and the Cybercrimes Act 19 of 2020.

Originality/value

The originality of this paper lies in the procedures followed during the physical search and seizure of digital information during the execution of search and seizure warrants for digital information in South Africa. If the South African Police Service follows the recommended procedures, it will contribute to the success of the South African Police Service, which would result in the improved quality of investigations and successful prosecution of crime in South Africa.

Open Access
Article
Publication date: 6 July 2023

Jacobus Gerhardus J. Nortje and Daniel Christoffel Myburgh

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of…

Abstract

Purpose

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of such a warrant in South African criminal cases.

Design/methodology/approach

This paper provides a brief overview of international and local impediments, followed by a detailed discussion of the implications of these impediments and how it is approached in various jurisdictions. The methodology of this paper consists of a literature review.

Findings

Addressing the impediments in the compilation of the application and the warrant will be beneficial for forensic investigators, the South African Police Service (SAPS) and the administration of justice in South Africa.

Research limitations/implications

Search and seizures for digital evidence form part of civil, regulatory and criminal search and seizures. This study focuses on the search and seizure of digital evidence in criminal matters pursuant to mainly the provisions of the Criminal Procedure Act 51 of 1977 and the Cybercrimes Act 19 of 2020.

Originality/value

The originality of this paper lies in the approach to the drafting of applications for search and seizure warrants for digital information in South Africa. The contribution of the study is that, by using this approach, the SAPS can address the impediments during the application and compilation of the warrants, which would enhance the quality of investigations and contribute to the successful investigation and prosecution of crime in South Africa.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 31 July 2023

Dewi Nur Maulidiyah

No country is free from financial crime issues. Therefore, this paper aims to discover how to control financial crime from the perspective of national culture.

Abstract

Purpose

No country is free from financial crime issues. Therefore, this paper aims to discover how to control financial crime from the perspective of national culture.

Design/methodology/approach

This study conducted a bibliometric approach and systematic literature review analysis of 47 publications in the Scopus database.

Findings

Bibliometric and content analyses show that national culture is more often associated with tax evasion, money laundering and corruption. The role of national culture is less investigated currently in the schemes of financial statement crime, workplace fraud and cybercrime. Overall, the study concludes financial crime can be prevented by developing a culture that supports anti-fraud measures. These include individualized country profiles, feminism, low power distance, tolerance for uncertainty, short-term orientation and restraint.

Originality/value

This research provides clear knowledge of the role of the six dimensions of national culture in fighting financial crime. Finally, this study is also valuable for decision-making in designing more effective financial crime prevention programs.

Details

Journal of Financial Crime, vol. 31 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 6 October 2023

Llewelyn Gray Curlewis

The purpose of this paper is to bring to light the present civil and criminal asset forfeiture procedures within the South African context and to make suggestions for reform…

Abstract

Purpose

The purpose of this paper is to bring to light the present civil and criminal asset forfeiture procedures within the South African context and to make suggestions for reform thereof. While there exists and is a need for constant change and reform of the law to ensure that it remains transparent, up-to-date and applicable to all means through which economic crime can be committed, South Africa lacks the necessary resources and attitudes to accomplish this essential goal.

Design/methodology/approach

The approach used in this paper is purely qualitative using journal articles, textbooks, reports, periodicals, speeches and legislation as its basis. It is through a consolidation of this literature that this paper was formed.

Findings

While South Africa’s present system of asset forfeiture is producing some impressive results, the process still has vast room for improvement. There are key areas which this paper outlines for reform. However, the probability of improvement is relatively low owing to the levels of corruption, illicit activities and attitudes of mistrust within the South African society at large.

Originality/value

The concept of asset forfeiture is not new to any international jurisdiction, let alone South Africa itself. However, this paper aims to give insight into the specific South African experience of this procedure and how it can possibly be improved within the specific context.

Article
Publication date: 27 June 2023

Durgesh Pandey and Paul Gilmour

The “metaverse” is the new buzzword. With the phenomenal growth of the metaverse comes accounting, taxation and jurisdictional challenges, which business and governments have yet…

Abstract

Purpose

The “metaverse” is the new buzzword. With the phenomenal growth of the metaverse comes accounting, taxation and jurisdictional challenges, which business and governments have yet to fully address. This paper aims to highlight and rationalise the lack of regulatory framework and multiplicity of jurisdictions on metaverse transactions. This paper addresses some of the complications with respect to accounting and taxation in virtual environments.

Design/methodology/approach

This study relies on secondary data and emerging literature to understand the multiplicity of jurisdiction and complexity of the accounting transactions. The concept of the metaverse is rapidly evolving, and this study uses extant literature to provide the foundation for understanding the key challenges relating to accounting and taxation.

Findings

Concepts of revenue recognition and deferment are challenged by the transactions in the metaverse. There are novel applications, underpinned by emerging technologies and blockchain supporting new crypto assets, such as non-fungible tokens and other decentralised finance (DeFi) tools; however, the caveats of anonymity and jurisdictional issues persist. The paper suggests that the industry must adapt to the unique reporting requirements of these assets and develop new standards for evaluating their value for financial reporting purposes. The paper emphasises the need for a case-based approach in the absence of standardised regulations for the accounting industry in the metaverse.

Originality/value

This paper adds original contributions to extant literature of the metaverse and advances ongoing debates into the accounting and taxation issues pertinent to the metaverse and DeFi.

Details

Journal of Financial Reporting and Accounting, vol. 22 no. 2
Type: Research Article
ISSN: 1985-2517

Keywords

Article
Publication date: 19 October 2022

Nasir Sultan and Norazida Mohamed

This study aims to determine the applicability of the placement-layering-integration model of money laundering (ML) in the South Asian context with emphasis on Pakistan by…

Abstract

Purpose

This study aims to determine the applicability of the placement-layering-integration model of money laundering (ML) in the South Asian context with emphasis on Pakistan by analysing different ML typologies.

Design/methodology/approach

This study applied content analysis in the first step. It explored three primary documents concerning ML typologies: Asia Pacific Group’s yearly reports on ML typologies from 2010 to 2021, the mutual evaluation reports and the National Risk Assessment of Pakistan. In the second step, expert interviews were recorded, and NVivo was used for data management and analysis.

Findings

This study found primary predicate offences: corruption, tax crimes, smuggling and drug and human trafficking. Pakistani launderers often use traditional typologies, including cash smuggling, round-tripping, multiple bank accounts, investment in real estate (in Pakistan and Dubai) and hawala. However, cybercrimes, cyber laundering and trade-based ML are rising. The politically exposed persons are involved in most of the laundering cases.

Originality/value

Rare studies specifically address the south Asian typologies and the limitations of the placement, layering and integration model. Therefore, there is a need to understand the current typologies used in developing, less regulated and undocumented jurisdictions like Pakistan.

Details

Journal of Money Laundering Control, vol. 27 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 January 2024

Keshnee Padayachee

This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale…

Abstract

Purpose

This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study. This paper aims to present the preliminary findings of an investigation that explored the constructs of personality traits and situational crime prevention theory (SCPT) as antecedents to social cognitive determinants (attitude, perceived behavioural control and subjective norms using the theory of planned behaviour [TPB] framing) and how these elements subsequently estimate compliant information security behaviour. Moreover, this paper delves into the contrasting influences of light and dark personality traits on insider information security compliance.

Design/methodology/approach

A cross-sectional survey was conducted to study SCPT measures and the personality factors dyad using a diverse but limited sample (n = 82).

Findings

There were ten significant direct relationships between SCPT factors and personality traits related to the components of the TPB. Seventeen hypotheses were not supported. However, these findings highlight the complexity of the topic under study.

Practical implications

Understanding individual differences within the compliance model could be used for custom training protocols, employee selection, assignment and specific types of information security interventions.

Originality/value

There is a scarcity of studies considering the effects of situational and personality factors, specifically the dark versus light triad of personality traits within the information security domain. Therefore, this preliminary result provides early insight that could guide further studies. This research could have important implications for organisations at risk of insider attacks.

Details

Information & Computer Security, vol. 32 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7619

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 4 June 2024

Andrew Ebekozien, Clinton Aigbavboa, Mohamad Shaharudin Samsurijan, Mohamed Ahmed Hafez Ahmed, Opeoluwa Akinradewo and Igbebo Omoh-Paul

The construction industry is unique but with uncertainties. This is because of the operating environment. This intricacy gives rise to several construction risks and is compounded…

Abstract

Purpose

The construction industry is unique but with uncertainties. This is because of the operating environment. This intricacy gives rise to several construction risks and is compounded in developing countries’ turbulent times. If not managed, these risks enhanced in turbulent times could negatively impact the Nigerian construction projects’ cost, time, quality, and performance. Hence, this study investigated the perceived encumbrances facing construction risk management techniques and identified measures to promote sustainable-based construction risk management in turbulent times.

Design/methodology/approach

The researchers adopted a qualitative approach and achieved saturation with 28 participants. The participants were government policymakers, quantity surveyors in government ministries/agencies/departments, consultant engineers, consultant architects, consultant and contracting quantity surveyors, and construction contractors knowledgeable about construction risk management. The research employed a thematic analysis for the study’s data.

Findings

Findings identified turbulent times related to the industry and major techniques for managing construction project risks in the Nigerian construction industry. It revealed lax adoption and implementation of practices. Also, the study identified major encumbrances facing construction risk and proffered initiatives that would promote sustainable-based construction risk management in turbulent times.

Originality/value

This study investigates encumbrances and suggests measures to promote construction project risk management in turbulent times in Nigeria. Also, the study contributes to the literature’s paucity, uncovering perceived encumbrances and evolving organisations’ management styles to imbed sustainable-based risk management practices by qualitative research design method.

Details

International Journal of Building Pathology and Adaptation, vol. 42 no. 7
Type: Research Article
ISSN: 2398-4708

Keywords

Access

Year

Last 3 months (48)

Content type

Article (48)
1 – 10 of 48