Search results

1 – 10 of 306
Article
Publication date: 17 January 2022

Yang Li, Jiaze Li, Qi Fan and Zhihong Wang

The teenager community is the most affected community by cybercrime in the COVID-19 era. Increasing social networks and facilitating teenager access to the Internet have increased…

Abstract

Purpose

The teenager community is the most affected community by cybercrime in the COVID-19 era. Increasing social networks and facilitating teenager access to the Internet have increased the probability of cybercrimes. On the other hand, entertainment such as mobile and computer games is top-rated among teenagers. Teenagers' tendency to cybercrime may be influenced by individual, parent, social, economic and political factors. Studying the impact of social networks, mobile games and parents' religious attitudes on teenagers' tendency to cybercrimes in the COVID-19 era is the primary goal of this paper.

Design/methodology/approach

The outbreak of COVID-19 caused a considerable change in the world and the lifestyle of all people. Information and Communication Technology (ICT) was also affected by the special conditions of this virus. Changes in ICT and rapid access to it have empowered individuals and organizations, and people have increased civic participation and interaction through ICT. However, the outbreak of COVID-19 has created new challenges for the government and citizens and may cause new crimes. Cybercrime is a type of crime that occurs in a cyber environment. These crimes range from invasions of privacy to crimes in which the offender vaguely paralyzes the macroeconomic. In this research, 265 students of high schools and universities are used for collecting data by utilizing a survey. Measuring actions have been done in all surveys employing a Likert scale. The causal pattern is assessed through a constructional equation modeling procedure to study the scheme's validity and reliability.

Findings

The outcomes have indicated that social networks have no significant relationship with teenagers' tendency to cybercrimes in the COVID-19 era. Mobile games have a mild effect on teenagers' tendency to cybercrimes in the COVID-19 era, and parents' religious attitudes significantly impact teenagers' tendency to cybercrimes in the COVID-19 era.

Research limitations/implications

Current research also has some restrictions that must be noticed in assessing the outcomes. First, sample research was selected from high schools and universities in one city. So, the size of the model is small, and the generalization of results is limited. Second, this research may have ignored other variables that affect the tendency of teenagers' to cybercrime. Future researchers intend to investigate the parents' upbringing system's impact on teenager's trend to cybercrime in the COVID-19 era. Future research can also examine practical factors such as parental upbringing, attitudes toward technology development and virtual addiction in the COVID-19 era.

Originality/value

In this study, teenagers' tendency to cybercrimes in the COVID-19 era is investigated, and a procedure is applied depending on a practical occasion. This article's offered sample provides a perfect framework for influencing parents' social networks, mobile games and religious attitudes on teenagers' tendency to cybercrimes in the COVID-19 era.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 22 August 2023

Deymah Alweqyan

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…

Abstract

Purpose

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.

Design/methodology/approach

This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.

Findings

Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.

Originality/value

To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 9 April 2024

Iftikhar Ahmad, Salim Khan and Shahid Iqbal

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…

Abstract

Purpose

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.

Design/methodology/approach

In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.

Findings

The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.

Research limitations/implications

This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.

Practical implications

This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.

Social implications

This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.

Originality/value

This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 25 August 2022

Lelia Cristina Díaz-Pérez, Ana Laura Quintanar-Reséndiz, Graciela Vázquez-Álvarez and Rubén Vázquez-Medina

Based on this holistic model, the authors propose and analyze seven key issues related to the admissibility of digital media in cross-border trials considering four Latin American…

1274

Abstract

Purpose

Based on this holistic model, the authors propose and analyze seven key issues related to the admissibility of digital media in cross-border trials considering four Latin American countries.

Design/methodology/approach

The authors apply the modeling process of the soft systems methodology by Checkland in order to develop a holistic model focused on human situation problems involving digital media and information technology devices or systems.

Findings

The authors discuss the status of the identified key issues in each country and offer a perspective on the integration of cross-border work analyzing the contribution of these key issues to the collaboration between countries criminal cases or the use of foreign digital artifacts in domestic trials.

Research limitations/implications

In this study, the authors assumed that the problems of official interaction between agencies of different countries are considered solved. However, for future studies or research, the authors recommend that these issues can be considered as relevant, since they are related to cross-border cooperation topics that will necessarily require unavoidable official arrangements, agreements and formalities.

Practical implications

This work is aimed at defining and analyzing the key issues that can contribute to the application of current techniques and methodologies in digital forensics as a tool to support the legal framework of each country, considering cross-border trials. Finally, the authors highlight the implications of this study lie in the identification and analysis of the key issues that must be considered for digital forensics as a support tool for the admissibility of digital evidence in cross-border trials.

Social implications

The authors consider that digital forensic will have high demand in cross-border trials, and it will depend on the people mobility between the countries considered in this study.

Originality/value

This paper shows that the soft systems methodology allows elaborating a holistic model focused on social problems involving digital media and informatics devices.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 16 January 2024

Xiaojun Wu, Zhongyun Zhou and Shouming Chen

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an…

Abstract

Purpose

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an understudied issue in the literature, namely, how users perceive the threat of and decide to use a threatening AI application. In particular, it examines the influencing factors and the mechanisms that affect an individual’s behavioral intention to use facial recognition, a threatening AI.

Design/methodology/approach

The authors develop a research model with trust as the key mediating variable by integrating technology threat avoidance theory, the theory of planned behavior and contextual factors related to facial recognition. Then, it is tested through a sequential mixed-methods investigation, including a qualitative study (for model development) of online comments from various platforms and a quantitative study (for model validation) using field survey data.

Findings

Perceived threat (triggered by perceived susceptibility and severity) and perceived avoidability (promoted by perceived effectiveness, perceived cost and self-efficacy) have negative and positive relationships, respectively, with an individual’s attitude toward facial recognition applications; these relationships are partially mediated by trust. In addition, perceived avoidability is positively related to perceived behavioral control, which along with attitude and subjective norm is positively related to individuals' intentions to use facial recognition applications.

Originality/value

This paper is among the first to examine the factors that affect the acceptance of threatening AI applications and how. The research findings extend the current literature by providing rich and novel insights into the important roles of perceived threat, perceived avoidability, and trust in affecting an individual’s attitude and intention regarding using threatening AI applications.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 8 April 2024

Princely Ifinedo, Francine Vachon and Anteneh Ayanso

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Abstract

Purpose

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Design/methodology/approach

A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.

Findings

The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.

Research limitations/implications

This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.

Practical implications

The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.

Originality/value

Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.

Article
Publication date: 15 June 2023

Zhiqin Lu, Peng Li, Qinghai Li and Heng Zhang

This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide…

Abstract

Purpose

This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide on individual happiness in China, accounting for the variations that exist across different groups, as well as the corresponding mechanisms.

Design/methodology/approach

This paper presents cross-sectional analyses of the relationship between the digital divide and individual happiness in China. The analyses are based on data from the Chinese General Social Survey 2017, which academic institutions run on the Chinese Mainland. This database contains information on respondents' Internet access, skills and consequences of use, which can measure the digital divide of Chinese individuals at three levels.

Findings

First, individual happiness declined when they experienced the digital access divide in China. For the digital capability divide, the lower the usage skills, the more individual happiness declined. When analyzing the digital outcome divide, the greater the negative consequences, the more individual happiness declined. Second, the impacts of digital access, capability and outcome divide vary according to age, gender, education degrees, hukou, region and sub-dimensions. Third, the digital access and capability divide reduce individuals' happiness by lowering their self-rated social and economic status, whereas the digital outcome divide reduce individual happiness by lowering their fairness perception and social trust.

Originality/value

The authors believe that this is the first study to examine the impact and its variations among different groups of the three-level digital divide on individual happiness, as well as its mechanisms.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 December 2023

Liangzhi Yu and Yao Zhang

This study aims to examine the potential of Information Ethics (IE) to serve as a coherent ethical foundation for the library and information science profession (LIS profession).

Abstract

Purpose

This study aims to examine the potential of Information Ethics (IE) to serve as a coherent ethical foundation for the library and information science profession (LIS profession).

Design/methodology/approach

This study consists of two parts: the first part present IE’s central theses and the main critiques it has received; the second part offers the authors' own evaluation of the theory from the LIS perspective in two steps: (1) assessing its internal consistency by testing its major theses against each other; (2) assessing its utility for resolving frequently debated LIS ethical dilemmas by comparing its solutions with solutions from other ethical theories.

Findings

This study finds that IE, consisting of an informational ontology, a fundamental ethical assertion and a series of moral laws, forms a coherent ethical framework and holds promising potential to serve as a theoretical foundation for LIS ethical issues; its inclusion of nonhuman objects as moral patients and its levels of abstraction mechanism proved to be particularly relevant for the LIS profession. This study also shows that, to become more solid an ethical theory, IE needs to resolve some of its internal contradictions and ambiguities, particularly its conceptual conflations between internal correctness, rightness and goodness; between destruction, entropy and evil; and the discrepancy between its deontological ethical assertion and its utilitarian moral laws.

Practical implications

This study alerts LIS professionals to the possibility of having a coherent ethical foundation and the potential of IE in this regard.

Originality/value

This study provides a systemic explication, evaluation and field test of IE from the LIS perspective.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 26 October 2020

Gopi Battineni, Nalini Chintalapudi and Francesco Amenta

After the identification of a novel severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) at Wuhan, China, a pandemic was widely spread worldwide. In Italy, about 240,000…

2239

Abstract

Purpose

After the identification of a novel severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) at Wuhan, China, a pandemic was widely spread worldwide. In Italy, about 240,000 people were infected because of this virus including 34,721 deaths until the end of June 2020. To control this new pandemic, epidemiologists recommend the enforcement of serious mitigation measures like country lockdown, contact tracing or testing, social distancing and self-isolation.

Design/methodology/approach

This paper presents the most popular epidemic model of susceptible (S), exposed (E), infected (I) and recovered (R) collectively called SEIR to understand the virus spreading among the Italian population.

Findings

Developed SEIR model explains the infection growth across Italy and presents epidemic rates after and before country lockdown. The results demonstrated that follow-up of strict measures such that country lockdown along with high testing is making Italy practically a pandemic-free country.

Originality/value

These models largely help to estimate and understand how an infectious agent spreads in a particular country and how individual factors can affect the dynamics. Further studies like classical SEIR modeling can improve the quality of data and implementation of this modeling could represent a novelty of epidemic models.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 7 November 2023

Darrell Norman Burrell

This case study paper aims to explore the complexities and challenges of epidemic response and public health surveillance in Native American and Indigenous American communities…

Abstract

Purpose

This case study paper aims to explore the complexities and challenges of epidemic response and public health surveillance in Native American and Indigenous American communities in the United States and find viable solutions. This paper explores these topics through the emergence and impact of the hantavirus pulmonary syndrome (HPS) within the Navajo Nation in the United States using critical incident analysis and best practices.

Design/methodology/approach

This project is a case study paper based on a topical review of the literature. A topical review of the literature is a comprehensive exploration of the current body of knowledge within a particular research field. It is an important tool used by scholars and practitioners to further the development of existing knowledge as well as to identify potential directions for future research (Fourie, 2020). Such a paper can provide a useful insight into the various aspects of the process that the researcher may have overlooked, as well as highlighting potential areas of improvement (Gall et al., 2020). It can also provide a useful source of ideas and inspiration for the researcher as it can provide an overview of the various approaches used by other researchers in the field (Göpferich, 2009). Case study papers using a topical review of the literature have been used to help frame and inform research topics, problems and best practices for some time. They are typically used to explore a topic in greater depth and to provide an overview of the literature to improve the world of practice to provide a foundation for future comprehensive empirical research. Case study papers can provide research value by helping to identify gaps in the literature and by providing a general direction for further research. They can also be used to provide a starting point for research questions and hypotheses and to help identify potential areas of inquiry.

Findings

This study explores best practices in public health surveillance and epidemic response that can help strengthen public health infrastructure by informing the development of effective surveillance systems and emergency response plans, as well as improving data collection and analysis capabilities within Native American and Indigenous American communities in the United States that also have the option to include new technologies like artificial intelligence (AI) with similar outbreaks in the future.

Research limitations/implications

The literature review did not include any primary data collection, so the existing available research may have limited the findings. The scope of the study was limited to published literature, which may not have reported all relevant findings. For example, unpublished studies, field studies and industry reports may have provided additional insights not included in the literature review. This research has significant value based on the limited amount of studies on how infectious diseases can severely impact Native American communities in the United States, leading to unnecessary and preventable suffering and death. As a result, research on viable best practices is needed on the best practices in public health surveillance and epidemic response in Native American and Indigenous American communities through historical events and critical incident analysis.

Practical implications

Research on public health surveillance and epidemic response in Native American communities can provide insights into the challenges faced by these communities and help identify potential solutions to improve their capacity to detect, respond to and prevent infectious diseases using innovative approaches and new technologies like AI.

Originality/value

More research on public health surveillance and epidemic response can inform policies and interventions to improve access to healthcare for Native American populations, such as increasing availability of healthcare services, providing culturally appropriate health education and improving communication between providers and patients. By providing better public health surveillance and response capacity, research can help reduce the burden of infectious diseases in Native American communities and ultimately lead to improved public health outcomes.

Details

Arab Gulf Journal of Scientific Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-9899

Keywords

1 – 10 of 306