Search results

1 – 10 of 937
Article
Publication date: 17 January 2023

Tessa Cole

The criminalization of online financial fraud is examined by analyzing the existing literature, policies and state statutes within the context of the cybercrime ecosystem…

Abstract

Purpose

The criminalization of online financial fraud is examined by analyzing the existing literature, policies and state statutes within the context of the cybercrime ecosystem. Therefore, this paper aims to investigate online fraud policies within the USA and the prevalence of such incidents to explore the effectiveness of current fraud policies.

Design/methodology/approach

This examination explores policies related to online fraud within the USA by defining online financial fraud incidents within the context of the cybercrime ecosystem and analyzing such incidents with routine activities theory to emphasize the current legislative inadequacies with provisional policy recommendations.

Findings

This research suggests online financial fraud is not unanimously conceptualized among regulating or criminal institutions. Although federal regulators have governed financial institutions, federal institutions have failed to account for the capabilities of computer-mediated and technological device use (12 USC §1829).

Research limitations/implications

The limited research analyzing the effectiveness of guardianship that prevents or deters internet-mitigated or dependent financial fraud crimes.

Practical implications

Policy recommendations include but are not limited to mandating federal and privatized financial institutions to disclose all fraudulent activity to all stakeholders (e.g. customers and local and federal criminal justice agencies).

Originality/value

This paper provides an innovative approach using a criminological theory and policy framework to examine the prevalence of online fraud and the regulations enacted to counteract such violations.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 17 April 2023

Rosa E. Rios, Hernan E. Riquelme and Alessandro Comai

The purpose of this empirical research is to investigate the influence of interactive virtually present others (VPOs) on a firm response and customers’ reiterated complaints…

Abstract

Purpose

The purpose of this empirical research is to investigate the influence of interactive virtually present others (VPOs) on a firm response and customers’ reiterated complaints (follow-ups) during service failures. This research follows up on previous experimental studies that suggest VPOs affect the focal customers’ complaint intention.

Design/methodology/approach

More than 16,000 posts (of complaints and complainants’ follow-ups) on 13 airline Facebook pages were analyzed using partial least squares.

Findings

This empirical study found that customers’ complaints are attended to the extent the complaints are followed up with more comments as supported by VPOs suggesting a contagion effect. Besides, it appears, the squeaky wheel is the one that gets the grease. The interactive virtual presence of others does not have an effect on a firm response toward them, despite their support to complainants and calling the airline to act.

Originality/value

To date, previous experimental studies have only featured a single VPO in potential complainants’ responses; however, in this empirical study the authors take into consideration the interaction of several VPOs in the service failure. Also, the focus is on the influence of VPOs on customers' complaints rather than the other way around.

Details

Journal of Services Marketing, vol. 37 no. 8
Type: Research Article
ISSN: 0887-6045

Keywords

Article
Publication date: 22 August 2023

Deymah Alweqyan

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…

Abstract

Purpose

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.

Design/methodology/approach

This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.

Findings

Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.

Originality/value

To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 11 August 2023

Jacobus Gerhardus J. Nortje and Daniel Christoffel Myburgh

This paper aims to identify impediments, discuss impediments and make recommendations for the impediments during the execution of a search and seizure warrant for digital evidence…

Abstract

Purpose

This paper aims to identify impediments, discuss impediments and make recommendations for the impediments during the execution of a search and seizure warrant for digital evidence in South African criminal cases.

Design/methodology/approach

The discussion of this article, the second article of two, focuses on a literature review of international and local impediments identified in case law and published research literature and how it is approached in various jurisdictions.

Findings

This study found that impediments identified and addressed internationally during the execution of a search and seizure warrant for digital evidence are relevant to South African criminal cases and still need to be addressed during the execution of a search and seizure warrant for digital evidence in South African criminal cases.

Research limitations/implications

Although searches and seizures for digital evidence are relevant to civil, regulatory and criminal investigations, this study focuses on the search and seizure for digital evidence in criminal matters with an emphasis on the provisions of the Criminal Procedure Act 51 of 1977 and the Cybercrimes Act 19 of 2020.

Originality/value

The originality of this paper lies in the procedures followed during the physical search and seizure of digital information during the execution of search and seizure warrants for digital information in South Africa. If the South African Police Service follows the recommended procedures, it will contribute to the success of the South African Police Service, which would result in the improved quality of investigations and successful prosecution of crime in South Africa.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 6 September 2022

Ibrahim Arpaci and Ersin Ateş

Cybercrimes increase day by day in parallel to cyber-attacks and cyber-threats. Due to such an increase, required cybersecurity precautions against all kinds of cyber-attacks and…

Abstract

Purpose

Cybercrimes increase day by day in parallel to cyber-attacks and cyber-threats. Due to such an increase, required cybersecurity precautions against all kinds of cyber-attacks and cyber-threats should be taken by both organizations and individuals. This study aims to develop a reliable and valid measurement tool to measure cybercrime awareness levels of individuals.

Design/methodology/approach

In this study, a scale named as Cybercrime Awareness Scale (CAS) has been developed and psychometric properties of the scale have been tested by two separate studies.

Findings

The first study included a total of 500 respondents (294 female and 206 male). In the first study, factor structure of the proposed scale has been determined through an exploratory factor analysis. The results revealed a three-factor structure (i.e. information systems crimes, personal data crimes, and privacy and security). Cronbach's alpha reliability coefficients for the subdimensions were 0.95, 0.92, and 0.90, respectively. The sample of the second study consisted of 494 respondents (281 female and 213 male). The confirmatory-factor-analysis results revealed that three-factor structure is valid and optimal model. Further, the proposed scale demonstrated moderate concurrent validity results in relation to the Digital Data Security Awareness Scale.

Originality/value

Findings indicated that the CAS is a valid and reliable measurement tool to measure individuals' cybercrime awareness level. This study makes a novel contribution to the existing cybersecurity literature by providing the CAS, which is developed by following rigorous methodological standards.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-01-2022-0023/

Details

Online Information Review, vol. 47 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 3 July 2023

Ishmael Mugari, Maxwell Kunambura, Emeka E. Obioha and Norah R. Gopo

This study aims to explore the nature and impacts of cybercrime in the Zimbabwean retail sector and evaluate the effectiveness of the current measures to deal with cybercrime.

Abstract

Purpose

This study aims to explore the nature and impacts of cybercrime in the Zimbabwean retail sector and evaluate the effectiveness of the current measures to deal with cybercrime.

Design/methodology/approach

This study adopted a mixed research design on a sample of 38 retail players in a small mining town, Bindura, who were selected using stratified random and purposive sampling techniques. Data were collected through a mainly closed-ended questionnaire and in-depth interview guide. Statistical Package for Social Sciences (SPSS) was used to analyse quantitative data, whereas summative content analysis was used to analyse qualitative data.

Findings

Virus dissemination, hacking and card fraud were identified as the major forms of cybercrime prevalent in the retail sector. Additional security costs, loss of sensitive data and direct financial losses were found to be the major impacts posed by cybercrime on retail sector. It was also established that the current internal measures and policing efforts to fight cybercrime in the retail sector were ineffective.

Originality/value

This study provides context-specific information on the scourge of cybercrime in a developing third world country that has of late been characterised by a myriad of other socioeconomic challenges. Although similar studies have been conducted in other parts of the globe, there has been a dearth of literature on retail sector cybercrime in Zimbabwe. This study also interrogates the Zimbabwean retail sector’s preparedness in dealing with this contemporary threat.

Details

Safer Communities, vol. 22 no. 4
Type: Research Article
ISSN: 1757-8043

Keywords

Article
Publication date: 28 March 2023

Arif Mahmud, Mohd Najwadi Yusoff and Mohd Heikal Husin

The factors that motivate Generation Z individuals to use the Internet of Things for security purposes have yet to be explored. Therefore, the purpose of this paper is to close a…

Abstract

Purpose

The factors that motivate Generation Z individuals to use the Internet of Things for security purposes have yet to be explored. Therefore, the purpose of this paper is to close a research gap by verifying the protection motivation theory using gender as a moderator.

Design/methodology/approach

The authors used a purposive sampling approach to collect data from Dhaka city, in which 370 valid responses were selected. Additionally, the quantitative and cross-sectional survey used a seven-point Likert scale. Afterward, the evaluation approach included three phases: a measurement model, a structural model and multi-group analysis.

Findings

Vulnerability, self-efficacy and response-efficacy were discovered to be critical predictors with a variance of 60.4%. Moreover, there was a significant disparity between males and females in two relationships, response efficacy and intention as well as response cost and intention.

Practical implications

This research expands our understanding of Generation Z consumers' behavioral intentions to take measures against household threats, allowing preventative programs to be improved. Further, in the case of applying coping strategies, a practical difference between males and females has been found that must be bridged through awareness campaigns.

Originality/value

This study has made a unique contribution to the information system literature. First, the role of protection motivation theory factors in addressing security concerns in homes has been assessed. Second, the coping evaluation process has a greater impact on users' intentions than the threat appraisal process. However, males and females use slightly different approaches to defending themselves against the threat.

Details

Journal of Systems and Information Technology, vol. 25 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 5 May 2023

Alain Tambe Ebot

This study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds.

Abstract

Purpose

This study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds.

Design/methodology/approach

This study is interpretive, based on case study interview data with two scammers operating in Africa. The interviews were done over a period of time, and the data collection and analysis processes were iterative, primarily driven by the interview data.

Findings

The authors identify four processes that explain how scammers build criminal expertise, namely, socializing with scammers, accepting scamming definitions, practicing scamming techniques and manipulating digital technologies. The fourth process (manipulating digital technologies) also explains why scammer’s tactics are successful.

Originality/value

AFF scamming is a major crime affecting individuals and organizations worldwide, yet it remains under researched as little is known about scammers, their expertise and why their deceptive techniques are successful. The first contribution identifies four processes by which individuals build scamming criminal expertise as they transition from scammers-in-the-making to full-blown active scammers. The second contribution identifies the rationalizations used by scammers-in-the-making and scammers to justify transitioning into scamming and engaging in scamming criminality. The third contribution explains how the digital environment contributes to the processes of building scamming criminal expertise and why scammer’s deceptive tactics are sometimes successful.

Details

Information & Computer Security, vol. 31 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 19 April 2023

Milad Soltani, Alexios Kythreotis and Arash Roshanpoor

The emergence of machine learning has opened a new way for researchers. It allows them to supplement the traditional manual methods for conducting a literature review and turning…

4149

Abstract

Purpose

The emergence of machine learning has opened a new way for researchers. It allows them to supplement the traditional manual methods for conducting a literature review and turning it into smart literature. This study aims to present a framework for incorporating machine learning into financial statement fraud (FSF) literature analysis. This framework facilitates the analysis of a large amount of literature to show the trend of the field and identify the most productive authors, journals and potential areas for future research.

Design/methodology/approach

In this study, a framework was introduced that merges bibliometric analysis techniques such as word frequency, co-word analysis and coauthorship analysis with the Latent Dirichlet Allocation topic modeling approach. This framework was used to uncover subtopics from 20 years of financial fraud research articles. Furthermore, the hierarchical clustering method was used on selected subtopics to demonstrate the primary contexts in the literature on FSF.

Findings

This study has contributed to the literature in two ways. First, this study has determined the top journals, articles, countries and keywords based on various bibliometric metrics. Second, using topic modeling and then hierarchy clustering, this study demonstrates the four primary contexts in FSF detection.

Research limitations/implications

In this study, the authors tried to comprehensively view the studies related to financial fraud conducted over two decades. However, this research has limitations that can be an opportunity for future researchers. The first limitation is due to language bias. This study has focused on English language articles, so it is suggested that other researchers consider other languages as well. The second limitation is caused by citation bias. In this study, the authors tried to show the top articles based on the citation criteria. However, judging based on citation alone can be misleading. Therefore, this study suggests that the researchers consider other measures to check the citation quality and assess the studies’ precision by applying meta-analysis.

Originality/value

Despite the popularity of bibliometric analysis and topic modeling, there have been limited efforts to use machine learning for literature review. This novel approach of using hierarchical clustering on topic modeling results enable us to uncover four primary contexts. Furthermore, this method allowed us to show the keywords of each context and highlight significant articles within each context.

Details

Journal of Financial Crime, vol. 30 no. 5
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 17 August 2021

Abir Al-Harrasi, Abdul Khalique Shaikh and Ali Al-Badi

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and…

1132

Abstract

Purpose

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and deploy multiple layers of security protection technology and protocols such as firewalls, VPNs and IPsec VPN. However, these technologies do not guarantee data protection, and especially from insiders. Insider threat is a critical risk that can cause harm to the organisation through data theft. The main purpose of this study was to investigate and identify the threats related to data theft caused by insiders in organisations and explore the efforts made by them to control data leakage.

Design/methodology/approach

The study proposed a conceptual model to protect organisations’ data by preventing data theft by malicious insiders. The researchers conducted a comprehensive literature review to achieve the objectives of this study. The collection of the data for this study is based on earlier studies conducted by several researchers from January 2011 to December 2020. All the selected literature is from journal articles, conference articles and conference proceedings using various databases.

Findings

The study revealed three main findings: first, the main risks inherent in data theft are financial fraud, intellectual property theft, and sabotage of IT infrastructure. Second, there are still some organisations that are not considering data theft by insiders as being a severe risk that should be well controlled. Lastly, the main factors motivating the insiders to perform data leakage activities are financial gain, lack of fairness and justice in the workplace, the psychology or characteristics of the insiders, new technologies, lack of education and awareness and lack of management tools for understanding insider threats.

Originality/value

The study provides a holistic view of data theft by insiders, focusing on the problem from an organisational point of view. Organisations can therefore take into consideration our recommendations to reduce the risks of data leakage by their employees.

Details

International Journal of Organizational Analysis, vol. 31 no. 3
Type: Research Article
ISSN: 1934-8835

Keywords

1 – 10 of 937