Search results
1 – 10 of 937The criminalization of online financial fraud is examined by analyzing the existing literature, policies and state statutes within the context of the cybercrime ecosystem…
Abstract
Purpose
The criminalization of online financial fraud is examined by analyzing the existing literature, policies and state statutes within the context of the cybercrime ecosystem. Therefore, this paper aims to investigate online fraud policies within the USA and the prevalence of such incidents to explore the effectiveness of current fraud policies.
Design/methodology/approach
This examination explores policies related to online fraud within the USA by defining online financial fraud incidents within the context of the cybercrime ecosystem and analyzing such incidents with routine activities theory to emphasize the current legislative inadequacies with provisional policy recommendations.
Findings
This research suggests online financial fraud is not unanimously conceptualized among regulating or criminal institutions. Although federal regulators have governed financial institutions, federal institutions have failed to account for the capabilities of computer-mediated and technological device use (12 USC §1829).
Research limitations/implications
The limited research analyzing the effectiveness of guardianship that prevents or deters internet-mitigated or dependent financial fraud crimes.
Practical implications
Policy recommendations include but are not limited to mandating federal and privatized financial institutions to disclose all fraudulent activity to all stakeholders (e.g. customers and local and federal criminal justice agencies).
Originality/value
This paper provides an innovative approach using a criminological theory and policy framework to examine the prevalence of online fraud and the regulations enacted to counteract such violations.
Details
Keywords
Rosa E. Rios, Hernan E. Riquelme and Alessandro Comai
The purpose of this empirical research is to investigate the influence of interactive virtually present others (VPOs) on a firm response and customers’ reiterated complaints…
Abstract
Purpose
The purpose of this empirical research is to investigate the influence of interactive virtually present others (VPOs) on a firm response and customers’ reiterated complaints (follow-ups) during service failures. This research follows up on previous experimental studies that suggest VPOs affect the focal customers’ complaint intention.
Design/methodology/approach
More than 16,000 posts (of complaints and complainants’ follow-ups) on 13 airline Facebook pages were analyzed using partial least squares.
Findings
This empirical study found that customers’ complaints are attended to the extent the complaints are followed up with more comments as supported by VPOs suggesting a contagion effect. Besides, it appears, the squeaky wheel is the one that gets the grease. The interactive virtual presence of others does not have an effect on a firm response toward them, despite their support to complainants and calling the airline to act.
Originality/value
To date, previous experimental studies have only featured a single VPO in potential complainants’ responses; however, in this empirical study the authors take into consideration the interaction of several VPOs in the service failure. Also, the focus is on the influence of VPOs on customers' complaints rather than the other way around.
Details
Keywords
This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…
Abstract
Purpose
This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.
Design/methodology/approach
This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.
Findings
Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.
Originality/value
To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.
Details
Keywords
Jacobus Gerhardus J. Nortje and Daniel Christoffel Myburgh
This paper aims to identify impediments, discuss impediments and make recommendations for the impediments during the execution of a search and seizure warrant for digital evidence…
Abstract
Purpose
This paper aims to identify impediments, discuss impediments and make recommendations for the impediments during the execution of a search and seizure warrant for digital evidence in South African criminal cases.
Design/methodology/approach
The discussion of this article, the second article of two, focuses on a literature review of international and local impediments identified in case law and published research literature and how it is approached in various jurisdictions.
Findings
This study found that impediments identified and addressed internationally during the execution of a search and seizure warrant for digital evidence are relevant to South African criminal cases and still need to be addressed during the execution of a search and seizure warrant for digital evidence in South African criminal cases.
Research limitations/implications
Although searches and seizures for digital evidence are relevant to civil, regulatory and criminal investigations, this study focuses on the search and seizure for digital evidence in criminal matters with an emphasis on the provisions of the Criminal Procedure Act 51 of 1977 and the Cybercrimes Act 19 of 2020.
Originality/value
The originality of this paper lies in the procedures followed during the physical search and seizure of digital information during the execution of search and seizure warrants for digital information in South Africa. If the South African Police Service follows the recommended procedures, it will contribute to the success of the South African Police Service, which would result in the improved quality of investigations and successful prosecution of crime in South Africa.
Details
Keywords
Cybercrimes increase day by day in parallel to cyber-attacks and cyber-threats. Due to such an increase, required cybersecurity precautions against all kinds of cyber-attacks and…
Abstract
Purpose
Cybercrimes increase day by day in parallel to cyber-attacks and cyber-threats. Due to such an increase, required cybersecurity precautions against all kinds of cyber-attacks and cyber-threats should be taken by both organizations and individuals. This study aims to develop a reliable and valid measurement tool to measure cybercrime awareness levels of individuals.
Design/methodology/approach
In this study, a scale named as Cybercrime Awareness Scale (CAS) has been developed and psychometric properties of the scale have been tested by two separate studies.
Findings
The first study included a total of 500 respondents (294 female and 206 male). In the first study, factor structure of the proposed scale has been determined through an exploratory factor analysis. The results revealed a three-factor structure (i.e. information systems crimes, personal data crimes, and privacy and security). Cronbach's alpha reliability coefficients for the subdimensions were 0.95, 0.92, and 0.90, respectively. The sample of the second study consisted of 494 respondents (281 female and 213 male). The confirmatory-factor-analysis results revealed that three-factor structure is valid and optimal model. Further, the proposed scale demonstrated moderate concurrent validity results in relation to the Digital Data Security Awareness Scale.
Originality/value
Findings indicated that the CAS is a valid and reliable measurement tool to measure individuals' cybercrime awareness level. This study makes a novel contribution to the existing cybersecurity literature by providing the CAS, which is developed by following rigorous methodological standards.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-01-2022-0023/
Details
Keywords
Ishmael Mugari, Maxwell Kunambura, Emeka E. Obioha and Norah R. Gopo
This study aims to explore the nature and impacts of cybercrime in the Zimbabwean retail sector and evaluate the effectiveness of the current measures to deal with cybercrime.
Abstract
Purpose
This study aims to explore the nature and impacts of cybercrime in the Zimbabwean retail sector and evaluate the effectiveness of the current measures to deal with cybercrime.
Design/methodology/approach
This study adopted a mixed research design on a sample of 38 retail players in a small mining town, Bindura, who were selected using stratified random and purposive sampling techniques. Data were collected through a mainly closed-ended questionnaire and in-depth interview guide. Statistical Package for Social Sciences (SPSS) was used to analyse quantitative data, whereas summative content analysis was used to analyse qualitative data.
Findings
Virus dissemination, hacking and card fraud were identified as the major forms of cybercrime prevalent in the retail sector. Additional security costs, loss of sensitive data and direct financial losses were found to be the major impacts posed by cybercrime on retail sector. It was also established that the current internal measures and policing efforts to fight cybercrime in the retail sector were ineffective.
Originality/value
This study provides context-specific information on the scourge of cybercrime in a developing third world country that has of late been characterised by a myriad of other socioeconomic challenges. Although similar studies have been conducted in other parts of the globe, there has been a dearth of literature on retail sector cybercrime in Zimbabwe. This study also interrogates the Zimbabwean retail sector’s preparedness in dealing with this contemporary threat.
Details
Keywords
Arif Mahmud, Mohd Najwadi Yusoff and Mohd Heikal Husin
The factors that motivate Generation Z individuals to use the Internet of Things for security purposes have yet to be explored. Therefore, the purpose of this paper is to close a…
Abstract
Purpose
The factors that motivate Generation Z individuals to use the Internet of Things for security purposes have yet to be explored. Therefore, the purpose of this paper is to close a research gap by verifying the protection motivation theory using gender as a moderator.
Design/methodology/approach
The authors used a purposive sampling approach to collect data from Dhaka city, in which 370 valid responses were selected. Additionally, the quantitative and cross-sectional survey used a seven-point Likert scale. Afterward, the evaluation approach included three phases: a measurement model, a structural model and multi-group analysis.
Findings
Vulnerability, self-efficacy and response-efficacy were discovered to be critical predictors with a variance of 60.4%. Moreover, there was a significant disparity between males and females in two relationships, response efficacy and intention as well as response cost and intention.
Practical implications
This research expands our understanding of Generation Z consumers' behavioral intentions to take measures against household threats, allowing preventative programs to be improved. Further, in the case of applying coping strategies, a practical difference between males and females has been found that must be bridged through awareness campaigns.
Originality/value
This study has made a unique contribution to the information system literature. First, the role of protection motivation theory factors in addressing security concerns in homes has been assessed. Second, the coping evaluation process has a greater impact on users' intentions than the threat appraisal process. However, males and females use slightly different approaches to defending themselves against the threat.
Details
Keywords
This study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds.
Abstract
Purpose
This study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds.
Design/methodology/approach
This study is interpretive, based on case study interview data with two scammers operating in Africa. The interviews were done over a period of time, and the data collection and analysis processes were iterative, primarily driven by the interview data.
Findings
The authors identify four processes that explain how scammers build criminal expertise, namely, socializing with scammers, accepting scamming definitions, practicing scamming techniques and manipulating digital technologies. The fourth process (manipulating digital technologies) also explains why scammer’s tactics are successful.
Originality/value
AFF scamming is a major crime affecting individuals and organizations worldwide, yet it remains under researched as little is known about scammers, their expertise and why their deceptive techniques are successful. The first contribution identifies four processes by which individuals build scamming criminal expertise as they transition from scammers-in-the-making to full-blown active scammers. The second contribution identifies the rationalizations used by scammers-in-the-making and scammers to justify transitioning into scamming and engaging in scamming criminality. The third contribution explains how the digital environment contributes to the processes of building scamming criminal expertise and why scammer’s deceptive tactics are sometimes successful.
Details
Keywords
Milad Soltani, Alexios Kythreotis and Arash Roshanpoor
The emergence of machine learning has opened a new way for researchers. It allows them to supplement the traditional manual methods for conducting a literature review and turning…
Abstract
Purpose
The emergence of machine learning has opened a new way for researchers. It allows them to supplement the traditional manual methods for conducting a literature review and turning it into smart literature. This study aims to present a framework for incorporating machine learning into financial statement fraud (FSF) literature analysis. This framework facilitates the analysis of a large amount of literature to show the trend of the field and identify the most productive authors, journals and potential areas for future research.
Design/methodology/approach
In this study, a framework was introduced that merges bibliometric analysis techniques such as word frequency, co-word analysis and coauthorship analysis with the Latent Dirichlet Allocation topic modeling approach. This framework was used to uncover subtopics from 20 years of financial fraud research articles. Furthermore, the hierarchical clustering method was used on selected subtopics to demonstrate the primary contexts in the literature on FSF.
Findings
This study has contributed to the literature in two ways. First, this study has determined the top journals, articles, countries and keywords based on various bibliometric metrics. Second, using topic modeling and then hierarchy clustering, this study demonstrates the four primary contexts in FSF detection.
Research limitations/implications
In this study, the authors tried to comprehensively view the studies related to financial fraud conducted over two decades. However, this research has limitations that can be an opportunity for future researchers. The first limitation is due to language bias. This study has focused on English language articles, so it is suggested that other researchers consider other languages as well. The second limitation is caused by citation bias. In this study, the authors tried to show the top articles based on the citation criteria. However, judging based on citation alone can be misleading. Therefore, this study suggests that the researchers consider other measures to check the citation quality and assess the studies’ precision by applying meta-analysis.
Originality/value
Despite the popularity of bibliometric analysis and topic modeling, there have been limited efforts to use machine learning for literature review. This novel approach of using hierarchical clustering on topic modeling results enable us to uncover four primary contexts. Furthermore, this method allowed us to show the keywords of each context and highlight significant articles within each context.
Details
Keywords
Abir Al-Harrasi, Abdul Khalique Shaikh and Ali Al-Badi
One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and…
Abstract
Purpose
One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and deploy multiple layers of security protection technology and protocols such as firewalls, VPNs and IPsec VPN. However, these technologies do not guarantee data protection, and especially from insiders. Insider threat is a critical risk that can cause harm to the organisation through data theft. The main purpose of this study was to investigate and identify the threats related to data theft caused by insiders in organisations and explore the efforts made by them to control data leakage.
Design/methodology/approach
The study proposed a conceptual model to protect organisations’ data by preventing data theft by malicious insiders. The researchers conducted a comprehensive literature review to achieve the objectives of this study. The collection of the data for this study is based on earlier studies conducted by several researchers from January 2011 to December 2020. All the selected literature is from journal articles, conference articles and conference proceedings using various databases.
Findings
The study revealed three main findings: first, the main risks inherent in data theft are financial fraud, intellectual property theft, and sabotage of IT infrastructure. Second, there are still some organisations that are not considering data theft by insiders as being a severe risk that should be well controlled. Lastly, the main factors motivating the insiders to perform data leakage activities are financial gain, lack of fairness and justice in the workplace, the psychology or characteristics of the insiders, new technologies, lack of education and awareness and lack of management tools for understanding insider threats.
Originality/value
The study provides a holistic view of data theft by insiders, focusing on the problem from an organisational point of view. Organisations can therefore take into consideration our recommendations to reduce the risks of data leakage by their employees.
Details