Search results

1 – 10 of 926
Article
Publication date: 11 October 2011

Chad Albrecht, Conan Albrecht and Shay Tzafrir

The purpose of this paper is to present and explain the identity theft cycle. The identity theft cycle explains how a perpetrator goes through various stages of confidence and…

3236

Abstract

Purpose

The purpose of this paper is to present and explain the identity theft cycle. The identity theft cycle explains how a perpetrator goes through various stages of confidence and experimentation when stealing an individual's identity.

Design/methodology/approach

The paper takes a conceptual approach by first describing identity theft in detail and then discussing the seriousness of identity theft for consumers today. The paper then presents and explains the identity theft cycle in greater detail including the stages of discovery, action, and trial.

Findings

The paper provides evidence to suggest that if identity theft is detected early, consumers can protect themselves from the vast and difficult consequences of identity theft.

Originality/value

This paper fulfills an important area of research by providing basic information about the nature of identity theft. This paper also discusses the various ways that perpetrators steal consumers' information, as well as teaches consumers how to proactively protect themselves from identity theft.

Details

Journal of Financial Crime, vol. 18 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 5 May 2020

Chander Mohan Gupta and Devesh Kumar

This paper aims to study the concept of identity fraud and how these identity thefts can actually lead to financial crime. These crimes which usually were done in the traditional…

1258

Abstract

Purpose

This paper aims to study the concept of identity fraud and how these identity thefts can actually lead to financial crime. These crimes which usually were done in the traditional way now have taken leaps with the increase in the use of cyber world.

Design/methodology/approach

Several research papers, articles and newsfeeds were referred to study the concept, growth, scope, effect and impact of identity theft. It was also found that identity theft is the most common type of cybercrimes.

Findings

Identity theft though a simple crime but if not taken care of can lead to multiple crimes which can affect not only individuals but also companies. And when these crimes impact companies, they can actually hamper the economy as a whole.

Practical implications

Information for the same is not available very easily, so the study is solely based on secondary data.

Social implications

Identity theft effects an individual not only financially but also mentally and socially; thus, these effect each and every one in the said economy.

Originality/value

This paper is an original work of the authors, and it is for the use of students, educators and academicians.

Details

Journal of Financial Crime, vol. 27 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 2 October 2017

Kai S. Koong, Lai C. Liu, Hong Qin and Tingting Ying

The purpose of this paper is to report on the findings and lessons that were learned from the many cases of internet fraud complaints that are gathered by the Federal Trade…

1394

Abstract

Purpose

The purpose of this paper is to report on the findings and lessons that were learned from the many cases of internet fraud complaints that are gathered by the Federal Trade Commission in the USA. The implications that are contained in the behavior of the complaints and trends identified are critical for addressing all types of online criminal activities in the increasing world of cybercrimes.

Design/methodology/approach

Data for this paper are extracted from the Consumer Sentinel Network Data Handbook covering a period of 13 years. Using the raw data, the occurrences were plotted and trends (number of cycles, time between cycles, and leading state and lagging states) were identified. Descriptive statistics covering the 13 years were examined and discussed. Using 20002 as the base year, the rate of growth of each of the states were ranked annually and were tested for stability and predictability using non-parametric approaches.

Findings

The key findings are indigenous to the occurrences of online fraud complaints in the USA. However, as the leading nation with the best database on fraud complaints, the findings are mission critical to fraud prevention across the globe. Specifically, this study found that since 2002, there have been four distinct cycles. Each cycle is clearly noticeable because there is a rapid growth in the number of crime complaints in the beginning half of the period followed by a slowing down period. However, the speed of change from one cycle to the next is steeper and the time gap is faster. While it is true that from the perspective of all the 50 states, the ranks appear to change every year and thus are not stable. However, the majority of the changes are relatively small so their relative positions by rank are still predictable.

Originality/value

The paper extends existing understanding of online fraud occurrences in the USA. The findings are timely and based on longitudinal data that span over a decade. The four new cycles identified are critical to the body of knowledge. The observed change in time from one cycle to another and its changes from a mathematic to a geometric one are also new. The findings are invaluable to persons working in law enforcement related occupations (auditors, lawyers, forensic experts, among others) and who must deal with the increasing problem of online fraud and cybercrimes.

Details

International Journal of Accounting & Information Management, vol. 25 no. 4
Type: Research Article
ISSN: 1834-7649

Keywords

Article
Publication date: 9 October 2007

Rika Butler

The purpose of this paper is to aim to educate the internet consumer, who may be a potential phishing victim, and to suggest a framework of anti‐phishing measures, following the

3821

Abstract

Purpose

The purpose of this paper is to aim to educate the internet consumer, who may be a potential phishing victim, and to suggest a framework of anti‐phishing measures, following the staggering increase in the number of recent phishing attacks. Phishing describes a method of online identity theft, in which phishers typically pose as legitimate organisations when sending deceptive e‐mail messages to internet users. When they respond to such e‐mails, victims are lured to malicious web sites, where they are duped into disclosing their personal details. In this way, phishers are able to commit identity theft, with possibly devastating consequences for the victim.

Design/methodology/approach

After a literature review of the available sources, the phishing threat is investigated by analysing the modus operandi of phishers and the basic components of a typical phishing scheme. A possible solution for the phishing problem is examined.

Findings

Phishers continually target the weakest link in the security chain, namely consumers, in their attacks. Educating the online consumer about phishing, as well as the implementation and proper application of anti‐phishing measures, are critical steps in protecting the identities of online consumers against e‐mail phishing attacks.

Originality/value

This article proposes measures that internet consumers can take to ward off phishing attacks, as well as remedial actions that they can take after falling victim to such an attack. By implementing these measures online, consumers can minimise the risk of becoming victims of successful phishing attacks, as well as remedy the negative effects of any past disclosure of information to phishers.

Details

The Electronic Library, vol. 25 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Book part
Publication date: 22 May 2015

Robert Smith and Gerard McElwee

To explore and document the emerging international market for stolen tractors and plant in the United Kingdom. Whilst this may appear to be a criminological problem relating…

Abstract

Purpose

To explore and document the emerging international market for stolen tractors and plant in the United Kingdom. Whilst this may appear to be a criminological problem relating specifically to rural crime, it is a sophisticated international criminal business organised by traditional organised crime groups (OCGs) such as the Italian, Polish and Turkish Mafia’s in conjunction with a network of criminal entrepreneurs.

Methodology/approach

Using annual statistical data provided by National Farmers Union (NFU) Mutual and Plant and Agricultural National Intelligence Unit (PANIU) and other material sourced using documentary research techniques supplemented by qualitative interviews with industry specialists we present 10 micro-case studies of rural OCGs engaged in this lucrative enterprise crime. The data is verified and authenticated using narrative inquiry techniques.

Findings

There is an entrepreneurial dimension to the crime because traditional criminal families with knowledge of rural areas and rural social capital form alliances with OCGs. The practical utility of the NFU model of entrepreneurial alliances with interested parties including the police is highlighted.

Research limitations/implications

Implications for research design, ethics and the conduct of such research which are identified and discussed. These include the need to develop an investigative framework to protect academic researchers similar to guidelines in place to protect investigative journalists.

Practical implications

An investigative framework and the adaption of the business model canvass (Osterwalder & Pigneur, 2010) to cover illegal business models are proposed.

Social implications

Suggestions are provided for the need to legislate against international criminal conspiracies.

Originality/value

Uses a mixture of entrepreneurship and criminological theories to help develop an understanding of the problem from an investigative perspective.

Details

Exploring Criminal and Illegal Enterprise: New Perspectives on Research, Policy & Practice
Type: Book
ISBN: 978-1-78441-551-8

Keywords

Article
Publication date: 15 November 2022

Shefali Saluja

The fraud landscape for FinTech industry has increased over the past few years, certainly during the time of COVID-19, FinTech market reported rapid growth in the fraud cases…

Abstract

Purpose

The fraud landscape for FinTech industry has increased over the past few years, certainly during the time of COVID-19, FinTech market reported rapid growth in the fraud cases (World Bank, 2020). Taking the consideration, the paper has qualitatively understood the loopholes of the FinTech industry and designed a conceptual model declaring “Identity Theft” as the major and the common fraud type in this industry. The paper is divided in two phases. The first phase discusses about the evolution of FinTech industry, the second phase discusses “Identity Theft” as the common fraud type in FinTech Industry and suggests solutions to prevent “Identity Theft” frauds. This study aims to serve as a guide for subsequent investigations into the FinTech sector and add to the body of knowledge regarding fraud detection and prevention. This study would also help organisations and regulators raise their professional standards in relation to the global fraud scene.

Design/methodology/approach

This paper revisits the literature to understand the evolution of FinTech Industry and the types of FinTech solutions. The authors argue that traditional models must be modernised to keep up with the current trends in the rapidly increasing number and severity of fraud incidents and however introduces the conceptual model of the common fraud type in FinTech Industry. The research also develops evidences based on theoretical underpinnings to enhance the comprehension of the key fraud-causing elements.

Findings

The authors have identified the most common fraud type in the FinTech Industry which is “Identity Theft” and supports the study with profusion of literature. “Identity theft” and various types of fraud continue to outbreak customers and industries similar in 2021, leaving several to wonder what could be the scenario in 2022 and coming years ahead (IBS Inteligence, 2022). “Identify theft” has been identified as one the common fraud schemes to defraud individuals as per the Association of Certified Fraud Examiners. There is a need for many of the FinTech organisations to create preventive measures to combat such fraud scheme. The authors suggest some preventive techniques to prevent corporate frauds in the FinTech industry.

Research limitations/implications

This study identifies the evolution of FinTech industry, major evidences of Identity Thefts and some preventive suggestions to combat identity theft frauds which requires practical approach in FinTech Industry. Further, this study is based out of qualitative data, the study can be modified with statistical data and can be measured with the quantitative results.

Practical implications

This study would also help organisations and regulators raise their professional standards in relation to the global fraud scene.

Social implications

This study will serve as a guide for subsequent investigations into the FinTech sector and add to the body of knowledge regarding fraud detection and prevention.

Originality/value

This study presents evidence for the most prevalent fraud scheme in the FinTech sector and proposes that it serve as a theoretical standard for all ensuing comparison.

Details

Journal of Financial Crime, vol. 31 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 25 August 2021

Umar Mir, Arpan Kumar Kar and Manmohan Prasad Gupta

This conceptual article’s primary aim is to identify the significant stakeholders of the digital identity system (DIS) and then highlight the impact of artificial intelligence…

Abstract

Purpose

This conceptual article’s primary aim is to identify the significant stakeholders of the digital identity system (DIS) and then highlight the impact of artificial intelligence (AI) on each of the identified stakeholders. It also recommends vital points that could be considered by policymakers while developing technology-related policies for effective DIS.

Design/methodology/approach

This article uses stakeholder methodology and design theory (DT) as a primary theoretical lens along with the innovation diffusion theory (IDT) as a sub-theory. This article is based on the analysis of existing literature that mainly comprises academic literature, official reports, white papers and publicly available domain experts’ interviews.

Findings

The study identified six significant stakeholders, i.e. government, citizens, infrastructure providers, identity providers (IdP), judiciary and relying parties (RPs) of the DIS from the secondary data. Also, the role of IdP becomes insignificant in the context of AI-enabled digital identity systems (AIeDIS). The findings depict that AIeDIS can positively impact the DIS stakeholders by solving a range of problems such as identity theft, unauthorised access and credential misuse, and will also open a possibility of new ways to empower all the stakeholders.

Research limitations/implications

The study is based on secondary data and has considered DIS stakeholders from a generic perspective. Incorporating expert opinion and empirical validation of the hypothesis could derive more specific and context-aware insights.

Practical implications

The study could facilitate stakeholders to enrich further their understanding and significance of developing sustainable and future-ready DIS by highlighting the impact of AI on the digital identity ecosystem.

Originality/value

To the best of the authors’ knowledge, this article is the first of its kind that has used stakeholder theory, DT and IDT to explain the design and developmental phenomenon of AIeDIS. A list of six significant stakeholders of DIS, i.e. government, citizens, infrastructure providers, IdP, judiciary and RP, is identified through comprehensive literature analysis.

Details

Journal of Science and Technology Policy Management, vol. 13 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 12 October 2010

Petter Gottschalk

The purpose of this paper is to present a systematic approach to classify financial crime into main categories as well as sub categories.

8169

Abstract

Purpose

The purpose of this paper is to present a systematic approach to classify financial crime into main categories as well as sub categories.

Design/methodology/approach

Based on a literature review, the main four categories were labeled corruption, fraud, theft, and manipulation, respectively.

Findings

There is a massive variety of crime types and crime names in the literature that can successfully be allocated to main categories of financial crime.

Research limitations/implications

The paper is based on exploratory research to stimulate future research in refining and improving the categories suggested here.

Practical implications

The great variety of criminal activities is classified in this paper so that practitioners can organize their thinking around crime themes rather than crime examples when mapping crime.

Social implications

The public and society at large will be able to understand the confusing variety of financial crime in terms of main categories.

Originality/value

There has been some confusion among both researchers and practitioners when communicating about examples of financial crime. The organizing framework in this paper will help allocate crime examples to main categories of financial crime.

Details

Journal of Financial Crime, vol. 17 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 25 April 2008

Alan D. Smith

The purpose of this paper is to provide practitioners of management a sense of importance in providing a balance between providing customer service and still safeguarding personal…

1023

Abstract

Purpose

The purpose of this paper is to provide practitioners of management a sense of importance in providing a balance between providing customer service and still safeguarding personal identity through a national identity program.

Design/methodology/approach

A review of the applied literature on national identity programs and a personal interview of 252 professional and semi‐professional people was conducted, representative of the service industries located in the metropolitan section of Pittsburgh, PA.

Findings

Via multiple linear regression, χ2, and factor analysis, virtually all the basic personal information and customer relationship management (CRM)‐related tenets of benefits with identity program, global security concerns, technology enabled, personal identity concerns, standardization concerns, wealth and education factors, cost of capita, online experiences, and confront with personal information, were found be statistically significant and positively related to the degree of invasion of privacy factor.

Practical implications

Although, there are many beneficial reasons why national identity programs should be implemented, such as security, convenience, and enhancing CRM‐related strategies, the vast majority of citizens have many fears and feel there are too many risks involved.

Originality/value

Few empirical studies existing in the literature, especially from a business perspective concerning national identity initiatives. These issues regarding national identification cards and CRM were addressed through exploratory data reduction analyses. Although, there were several significant and negative issues associated with implementation, in general, if citizens are better educated about the benefits of a national identification card they are more willing to adopt it and pay for the program.

Details

Industrial Management & Data Systems, vol. 108 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Book part
Publication date: 24 June 2011

Michael Levi

A number of approaches might be taken to the relationship between economic crises and white-collar crimes. One is to review the role that white-collar crimes played in causing…

Abstract

A number of approaches might be taken to the relationship between economic crises and white-collar crimes. One is to review the role that white-collar crimes played in causing economic crisis, but this is legally problematic. This chapter begins with a discussion of social reaction to different forms of white-collar crime, and then goes on to examine briefly the evidence for the impact of the economic crisis on levels of frauds. The core argument is that the economic crisis did affect social and official reaction to some frauds – though the impact of this may be temporary – but that unlike most “law and order” issues, politicians around the world have typically downplayed fears of elite criminality and serious misconduct. Most reactions to white-collar crime reflect longer-term populist sentiments that prioritize offenses such as identity theft and fraud. Furthermore, there is little evidence that the Global Financial Crisis did much to increase the risk of fraud, though it is easy to misattribute the revelation of longer-running frauds to the crisis instead of to the fact that the recession smoked them out of the woodwork.

Details

Economic Crisis and Crime
Type: Book
ISBN: 978-0-85724-801-5

1 – 10 of 926