Search results

1 – 10 of 243
Article
Publication date: 16 January 2024

Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…

Abstract

Purpose

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.

Design/methodology/approach

The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.

Findings

The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.

Research limitations/implications

This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.

Practical implications

Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.

Originality/value

The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.

Details

The Journal of Risk Finance, vol. 25 no. 2
Type: Research Article
ISSN: 1526-5943

Keywords

Article
Publication date: 7 April 2023

Devang Chhtrapati, Dharmendra Trivedi, Shanti P. Chaudhari, Arpit Sharma and Atul Bhatt

This study concentrates on assessing the research productivity in the domain of social media security in the past decades. The purpose of this study is to conduct a comprehensive…

Abstract

Purpose

This study concentrates on assessing the research productivity in the domain of social media security in the past decades. The purpose of this study is to conduct a comprehensive bibliometric review on social media using various bibliometric indicators.

Design/methodology/approach

A total of 8,121 scientific publications were retrieved from Scopus database from period 1998 to 2021 using associated keyword search. This study also used VOSviewer© tool to evaluate the network visualisation.

Findings

The result of this study revealed that there is a steady growth of annual publications except for the years 2015 and 2016. A total of 8,121 scientific publications and 80,454 total citations were found with 11.2 average citations per publication. The USA, China and India were top productive countries in terms of publishing research in the field; Chinese Academy of Sciences secured top position with 126 publications in highly productive organisation in the domain. The lecture notes in computer science from Springer Nature received a highly produced title with 553 publications and 4,453 total citations. For co-occurrence of author’s keywords, network visualisation analysis revealed that “Social Media”, “Social Network”, “Security”, “Privacy” and “Trust” found maximum occurrence in the domain of social media security.

Research limitations/implications

This study provides comprehensive research status of social media security by performing a bibliometric analysis. The findings of this study will help relevant researchers to understand the research trend, pursue scientific collaborators and enhance research topic preferences.

Originality/value

The rareness of this study, detailed bibliometric analysis on the domain of social media security, is proven using numerous bibliometric indicators and application of VOSviewer in the domain.

Details

Information Discovery and Delivery, vol. 52 no. 1
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 19 February 2024

Kashmira Ganji and Nikhat Afshan

In response to the growing interest in Internet of Things (IoT) technology and its profound implications for businesses and individuals, this bibliometric study focuses on a…

Abstract

Purpose

In response to the growing interest in Internet of Things (IoT) technology and its profound implications for businesses and individuals, this bibliometric study focuses on a critical yet understudied aspect, i.e. cybersecurity. As IoT adoption grows, so do concerns regarding user privacy and data security. This study aims to provide a comprehensive understanding of the current research in this vital area, shedding light on research trends, gaps and emerging themes.

Design/methodology/approach

The study conducted a bibliometric analysis and systematic review of literature spanning over two decades (2013–2023). Bibliometric analysis is conducted using Biblioshiny which is R-software-based advanced analytical tool. Further, VOSviewer is used to conduct network analysis. The study highlights the evolving landscape of IoT cybersecurity, emphasizing interdisciplinary intersections and the ethical dimensions of IoT technologies.

Findings

The study uncovers crucial concerns related to IoT adoption, emphasizing the urgent need for comprehensive cybersecurity protocols. It identifies emerging themes such as artificial intelligence and blockchain integration, indicating a shift toward interdisciplinary solutions. Furthermore, the research highlights ethical gaps in current IoT discussions, emphasizing the importance of responsible innovation.

Research limitations/implications

Businesses can bolster their cybersecurity strategies, policymakers can craft informed regulations and researchers are encouraged to explore IoT’s ethical dimensions.

Originality/value

This study pioneers a nuanced analysis of IoT cybersecurity, filling a crucial gap in the existing business and management literature. By synthesizing a decade of scholarly work, it provides foundational insights for researchers, businesses and policymakers. The research not only informs academic discourse but also offers practical guidance for enhancing IoT security measures and fostering ethical innovation.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 5 March 2024

Sana Ramzan and Mark Lokanan

This study aims to objectively synthesize the volume of accounting literature on financial statement fraud (FSF) using a systematic literature review research method (SLRRM). This…

Abstract

Purpose

This study aims to objectively synthesize the volume of accounting literature on financial statement fraud (FSF) using a systematic literature review research method (SLRRM). This paper analyzes the vast FSF literature based on inclusion and exclusion criteria. These criteria filter articles that are present in the accounting fraud domain and are published in peer-reviewed quality journals based on Australian Business Deans Council (ABDC) journal ranking. Lastly, a reverse search, analyzing the articles' abstracts, further narrows the search to 88 peer-reviewed articles. After examining these 88 articles, the results imply that the current literature is shifting from traditional statistical approaches towards computational methods, specifically machine learning (ML), for predicting and detecting FSF. This evolution of the literature is influenced by the impact of micro and macro variables on FSF and the inadequacy of audit procedures to detect red flags of fraud. The findings also concluded that A* peer-reviewed journals accepted articles that showed a complete picture of performance measures of computational techniques in their results. Therefore, this paper contributes to the literature by providing insights to researchers about why ML articles on fraud do not make it to top accounting journals and which computational techniques are the best algorithms for predicting and detecting FSF.

Design/methodology/approach

This paper chronicles the cluster of narratives surrounding the inadequacy of current accounting and auditing practices in preventing and detecting Financial Statement Fraud. The primary objective of this study is to objectively synthesize the volume of accounting literature on financial statement fraud. More specifically, this study will conduct a systematic literature review (SLR) to examine the evolution of financial statement fraud research and the emergence of new computational techniques to detect fraud in the accounting and finance literature.

Findings

The storyline of this study illustrates how the literature has evolved from conventional fraud detection mechanisms to computational techniques such as artificial intelligence (AI) and machine learning (ML). The findings also concluded that A* peer-reviewed journals accepted articles that showed a complete picture of performance measures of computational techniques in their results. Therefore, this paper contributes to the literature by providing insights to researchers about why ML articles on fraud do not make it to top accounting journals and which computational techniques are the best algorithms for predicting and detecting FSF.

Originality/value

This paper contributes to the literature by providing insights to researchers about why the evolution of accounting fraud literature from traditional statistical methods to machine learning algorithms in fraud detection and prediction.

Details

Journal of Accounting Literature, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-4607

Keywords

Article
Publication date: 13 September 2022

Dini Rosdini, Ersa Tri Wahyuni and Prima Yusi Sari

This study aims to explore credit scoring regulations, governance, variables and methods used by peer-to-peer (P2P) lending platforms in key players of the Association of…

Abstract

Purpose

This study aims to explore credit scoring regulations, governance, variables and methods used by peer-to-peer (P2P) lending platforms in key players of the Association of Southeast Asian Nations (ASEAN) region’s P2P, Indonesia, Malaysia and Singapore.

Design/methodology/approach

This study explores the P2P Lending characteristics of the three countries using qualitative literature review, interview, focus group discussion and desk research.

Findings

This study concludes that the credit scoring variables used by the countries’ companies are almost the same. Key drivers of the differences are countries’ regulations, management/business core value and credit scoring data processing methods.

Practical implications

Ultimately, this research provides a comprehensive view for investors, businesses and researchers on the topic of ASEAN credit scoring governance and will help them navigate the complexities and improve their awareness on the importance of credit scoring governance in P2P lending companies.

Originality/value

This research provides an in-depth perspective on how P2P lending companies, credit scoring governance and regulations in the biggest three countries in Southeast Asia.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 2
Type: Research Article
ISSN: 2053-4620

Keywords

Open Access
Article
Publication date: 19 October 2023

Tinna Dögg Sigurdardóttir, Lee Rainbow, Adam Gregory, Pippa Gregory and Gisli Hannes Gudjonsson

The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).

2469

Abstract

Purpose

The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).

Design/methodology/approach

The 77 BIA reports reviewed were written between 2016 and 2021. They were evaluated using Toulmin’s (1958) strategy for structuring pertinent arguments, current compliance with professional standards, the grounds and backing provided for the claims made and the potential utility of the recommendations provided.

Findings

Consistent with previous research, most of the reports involved murder and sexual offences. The BIA reports met professional standards with extremely high frequency. The 77 reports contained a total of 1,308 claims of which 99% were based on stated grounds. A warrant and/or backing was provided for 73% of the claims. Most of the claims in the BIA reports involved a behavioural evaluation of the crime scene and offender characteristics. The potential utility of the reports was judged to be 95% for informative behavioural crime scene analysis and 40% for potential new lines of enquiry.

Practical implications

The reports should serve as a model for the work of behavioural investigative advisers internationally.

Originality/value

To the best of the authors’ knowledge, this is the first study to systematically evaluate BIA reports commissioned by the NCA; it adds to previous similar studies by evaluating the largest number of BIA reports ever reviewed, and uniquely provides judgement of overall utility.

Article
Publication date: 28 March 2024

Dean Wilkinson, Isha Chopra and Sophie Badger

Knife crime and serious violent crime (SVC) among youth has been growing at an alarming rate in the UK (Harding and Allen, 2021). Community and school-based intervention and…

Abstract

Purpose

Knife crime and serious violent crime (SVC) among youth has been growing at an alarming rate in the UK (Harding and Allen, 2021). Community and school-based intervention and prevention services to tackle knife crime are being developed with some evaluation; however, these are independent and of varied quality and rigour. Therefore, the purpose of this study is to record the approaches being developed and synthesise existing evidence of the impact and effectiveness of programmes to reduce knife crime. In addition, the complex factors contributing to knife crime and SVC are discussed.

Design/methodology/approach

A systematic approach was used to conduct this knife crime intervention evidence review using two search engines and four databases. Inclusion and exclusion criteria were applied to ensure focus and relevance. The results of searches and decisions by the research team were recorded at each stage using Preferred Reporting Items for systematic reviews and meta-analyses (PRISMA).

Findings

Some evidence underpins the development of services to reduce knife crime. Much of the evidence comes from government funded project reports, intervention and prevention services reports, with few studies evaluating the efficacy of intervention programmes at present. Some studies that measured immediate impact in line with the programme’s aims were found and demonstrated positive results.

Originality/value

This systematic review specifically synthesised the evidence and data derived from knife crime and weapon carrying interventions and preventions, integrating both grey and published literature, with a novel discussion that highlights the importance of outcome evaluations and issues with measuring the success of individual level interventions and their contributions to the overall reduction of violence.

Details

Journal of Criminal Psychology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 1 April 2024

Selye Lee

While the significance of public cooperation for police effectiveness is widely acknowledged, less is known about factors associated with cooperation in hate crime cases. The…

Abstract

Purpose

While the significance of public cooperation for police effectiveness is widely acknowledged, less is known about factors associated with cooperation in hate crime cases. The current study aims to explore how individuals’ perspectives on police legitimacy, contact experience with police and race/ethnicity shape their willingness to cooperate with police in hate crime incidents.

Design/methodology/approach

This study used a sample of 693 college students and was conducted at a public university in the south-central region of the southern United States of America. Ordinary least squares (OLS) regression models were used to examine factors related to willingness to cooperate with police.

Findings

Findings show that those who have a high level of positive perceptions of police legitimacy and those who have a low level of negative personal experience with police reported more willingness to cooperate. Asian respondents were less likely to report that they would cooperate with police compared to white respondents.

Originality/value

This study, emphasizing the relationships between perceived police legitimacy and positive personal experiences with a willingness to cooperate in hate crime cases, has practical implications. The identification of racial/ethnic differences in cooperation attitudes, particularly the lower likelihood of cooperation among Asian respondents, contributed to the current literature and underscores the importance of considering diverse perspectives and outreach efforts.

Details

Policing: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 16 June 2023

Marcus Smith and Milind Tiwari

This paper aims to explain the implications of the impending establishment of national blockchain infrastructure by governments around the world, and how these structures can be…

Abstract

Purpose

This paper aims to explain the implications of the impending establishment of national blockchain infrastructure by governments around the world, and how these structures can be integrated with existing legislation and assist in the prevention of financial crime.

Design/methodology/approach

The methodology used is a literature review and analysis of progress being made to establish national blockchain infrastructure. It provides a discussion of the connection between blockchain and financial crime, and how this infrastructure will interact with existing regulatory frameworks, and particularly, financial crime legislation.

Findings

This paper documents financial crime risks posed by digital currencies and smart contracts and the role that national blockchain infrastructure can potentially play in mitigating these risks. It highlights the need for governments to devote resources to developing this infrastructure and associated regulatory frameworks.

Originality/value

There are few, if any, academic papers in the financial crime, or wider literature, that have examined the potential for national blockchain infrastructures prevent financial crime, including the implications for existing regulation in the field.

Details

Journal of Financial Crime, vol. 31 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 1 February 2023

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

4090

Abstract

Purpose

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

Design/methodology/approach

The study uses a qualitative approach involving the use of structured questionnaires. The questionnaires were made available to the staff of 17 licensed banks in South Africa who deal with management, operation, administration and banking services. Two hypotheses were formulated and non-parametric statistical analyses involving the use of Chi-square test, Fischer’s Exact test and Spearman’s correlation were carried out. The two hypotheses formulated were tested to draw a conclusion.

Findings

The results obtained indicate that the impact of cyberfraud in the South African banking industry is highly significant and has affected the reputation of some of the banks. This calls for the need to review the diverse ways of curbing cyberfraud to lessen their impact and that of associated fraud risks on the banking operation.

Practical implications

This study provides an analysis on the relationship cyberfraud occurrences and the reputation of South African banks. The implementation of the recommendations may reinforce the existing security measures in the fight against cyberfraud.

Originality/value

The novelty of this study lies in the fact that the assessment of the impact of cyberfraud on the banking industry in South Africa has not been sufficiently highlighted by the existing literature.

Details

Journal of Financial Crime, vol. 31 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of 243