Search results

1 – 10 of 150
Article
Publication date: 9 April 2024

Iftikhar Ahmad, Salim Khan and Shahid Iqbal

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…

Abstract

Purpose

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.

Design/methodology/approach

In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.

Findings

The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.

Research limitations/implications

This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.

Practical implications

This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.

Social implications

This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.

Originality/value

This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 16 January 2024

Xiaojun Wu, Zhongyun Zhou and Shouming Chen

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an…

Abstract

Purpose

Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an understudied issue in the literature, namely, how users perceive the threat of and decide to use a threatening AI application. In particular, it examines the influencing factors and the mechanisms that affect an individual’s behavioral intention to use facial recognition, a threatening AI.

Design/methodology/approach

The authors develop a research model with trust as the key mediating variable by integrating technology threat avoidance theory, the theory of planned behavior and contextual factors related to facial recognition. Then, it is tested through a sequential mixed-methods investigation, including a qualitative study (for model development) of online comments from various platforms and a quantitative study (for model validation) using field survey data.

Findings

Perceived threat (triggered by perceived susceptibility and severity) and perceived avoidability (promoted by perceived effectiveness, perceived cost and self-efficacy) have negative and positive relationships, respectively, with an individual’s attitude toward facial recognition applications; these relationships are partially mediated by trust. In addition, perceived avoidability is positively related to perceived behavioral control, which along with attitude and subjective norm is positively related to individuals' intentions to use facial recognition applications.

Originality/value

This paper is among the first to examine the factors that affect the acceptance of threatening AI applications and how. The research findings extend the current literature by providing rich and novel insights into the important roles of perceived threat, perceived avoidability, and trust in affecting an individual’s attitude and intention regarding using threatening AI applications.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 8 April 2024

Princely Ifinedo, Francine Vachon and Anteneh Ayanso

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Abstract

Purpose

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Design/methodology/approach

A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.

Findings

The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.

Research limitations/implications

This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.

Practical implications

The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.

Originality/value

Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.

Article
Publication date: 28 December 2023

Liangzhi Yu and Yao Zhang

This study aims to examine the potential of Information Ethics (IE) to serve as a coherent ethical foundation for the library and information science profession (LIS profession).

Abstract

Purpose

This study aims to examine the potential of Information Ethics (IE) to serve as a coherent ethical foundation for the library and information science profession (LIS profession).

Design/methodology/approach

This study consists of two parts: the first part present IE’s central theses and the main critiques it has received; the second part offers the authors' own evaluation of the theory from the LIS perspective in two steps: (1) assessing its internal consistency by testing its major theses against each other; (2) assessing its utility for resolving frequently debated LIS ethical dilemmas by comparing its solutions with solutions from other ethical theories.

Findings

This study finds that IE, consisting of an informational ontology, a fundamental ethical assertion and a series of moral laws, forms a coherent ethical framework and holds promising potential to serve as a theoretical foundation for LIS ethical issues; its inclusion of nonhuman objects as moral patients and its levels of abstraction mechanism proved to be particularly relevant for the LIS profession. This study also shows that, to become more solid an ethical theory, IE needs to resolve some of its internal contradictions and ambiguities, particularly its conceptual conflations between internal correctness, rightness and goodness; between destruction, entropy and evil; and the discrepancy between its deontological ethical assertion and its utilitarian moral laws.

Practical implications

This study alerts LIS professionals to the possibility of having a coherent ethical foundation and the potential of IE in this regard.

Originality/value

This study provides a systemic explication, evaluation and field test of IE from the LIS perspective.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 7 November 2023

Darrell Norman Burrell

This case study paper aims to explore the complexities and challenges of epidemic response and public health surveillance in Native American and Indigenous American communities…

Abstract

Purpose

This case study paper aims to explore the complexities and challenges of epidemic response and public health surveillance in Native American and Indigenous American communities in the United States and find viable solutions. This paper explores these topics through the emergence and impact of the hantavirus pulmonary syndrome (HPS) within the Navajo Nation in the United States using critical incident analysis and best practices.

Design/methodology/approach

This project is a case study paper based on a topical review of the literature. A topical review of the literature is a comprehensive exploration of the current body of knowledge within a particular research field. It is an important tool used by scholars and practitioners to further the development of existing knowledge as well as to identify potential directions for future research (Fourie, 2020). Such a paper can provide a useful insight into the various aspects of the process that the researcher may have overlooked, as well as highlighting potential areas of improvement (Gall et al., 2020). It can also provide a useful source of ideas and inspiration for the researcher as it can provide an overview of the various approaches used by other researchers in the field (Göpferich, 2009). Case study papers using a topical review of the literature have been used to help frame and inform research topics, problems and best practices for some time. They are typically used to explore a topic in greater depth and to provide an overview of the literature to improve the world of practice to provide a foundation for future comprehensive empirical research. Case study papers can provide research value by helping to identify gaps in the literature and by providing a general direction for further research. They can also be used to provide a starting point for research questions and hypotheses and to help identify potential areas of inquiry.

Findings

This study explores best practices in public health surveillance and epidemic response that can help strengthen public health infrastructure by informing the development of effective surveillance systems and emergency response plans, as well as improving data collection and analysis capabilities within Native American and Indigenous American communities in the United States that also have the option to include new technologies like artificial intelligence (AI) with similar outbreaks in the future.

Research limitations/implications

The literature review did not include any primary data collection, so the existing available research may have limited the findings. The scope of the study was limited to published literature, which may not have reported all relevant findings. For example, unpublished studies, field studies and industry reports may have provided additional insights not included in the literature review. This research has significant value based on the limited amount of studies on how infectious diseases can severely impact Native American communities in the United States, leading to unnecessary and preventable suffering and death. As a result, research on viable best practices is needed on the best practices in public health surveillance and epidemic response in Native American and Indigenous American communities through historical events and critical incident analysis.

Practical implications

Research on public health surveillance and epidemic response in Native American communities can provide insights into the challenges faced by these communities and help identify potential solutions to improve their capacity to detect, respond to and prevent infectious diseases using innovative approaches and new technologies like AI.

Originality/value

More research on public health surveillance and epidemic response can inform policies and interventions to improve access to healthcare for Native American populations, such as increasing availability of healthcare services, providing culturally appropriate health education and improving communication between providers and patients. By providing better public health surveillance and response capacity, research can help reduce the burden of infectious diseases in Native American communities and ultimately lead to improved public health outcomes.

Details

Arab Gulf Journal of Scientific Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-9899

Keywords

Article
Publication date: 21 November 2023

Zhaohua Deng, Rongyang Ma, Manli Wu and Richard Evans

This study analyzes the evolution of topics related to COVID-19 on Chinese social media platforms with the aim of identifying changes in netizens' concerns during the different…

38

Abstract

Purpose

This study analyzes the evolution of topics related to COVID-19 on Chinese social media platforms with the aim of identifying changes in netizens' concerns during the different stages of the pandemic.

Design/methodology/approach

In total, 793,947 posts were collected from Zhihu, a Chinese Question and Answer website, and Dingxiangyuan, a Chinese online healthcare community, from 31 December, 2019, to 4 August, 2021. Topics were extracted during the prodromal and outbreak stages, and in the abatement–resurgence cycle.

Findings

Netizens' concerns varied in different stages. During the prodromal and outbreak stages, netizens showed greater concern about COVID-19 news, the impact of COVID-19 and the prevention and control of COVID-19. During the first round of the abatement and resurgence stage, netizens remained concerned about COVID-19 news and the prevention and control of the pandemic, however, less attention was paid to the impact of COVID-19. During later stages, popularity grew in topics concerning the impact of COVID-19, while netizens engaged more in discussions about international events and the raising of spirits to fight the global pandemic.

Practical implications

This study contributes to the practice by providing a way for the government and policy makers to retrospect the pandemic and thereby make a good preparation to take proper measures to communicate with citizens and address their demands in similar situations in the future.

Originality/value

This study contributes to the literature by applying an adapted version of Fink's (1986) crisis life cycle to create a five-stage evolution model to understand the repeated resurgence of COVID-19 in Mainland China.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 3 April 2024

Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Abstract

Purpose

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Design/methodology/approach

This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.

Findings

The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.

Research limitations/implications

This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.

Originality/value

This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 29 March 2024

Anup Kumar

The COVID-19 outbreak reached a critical stage when it became imperative for public health systems to act decisively and design potential behavioral operational strategies aimed…

Abstract

Purpose

The COVID-19 outbreak reached a critical stage when it became imperative for public health systems to act decisively and design potential behavioral operational strategies aimed at containing the pandemic. Isolation through social distancing played a key role in achieving this objective. This research study examines the factors affecting the intention of individuals toward social distancing in India.

Design/methodology/approach

A correlation study was conducted on residents from across Indian states (N = 499). Online questionnaires were floated, consisting of health belief model and theory of planned behavior model, with respect to social distancing behavior initially. Finally, structural equation modeling was used to test the hypotheses.

Findings

The results show that perceived susceptibility (PS), facilitating conditions (FC) and subjective norms are the major predictors of attitude toward social distancing, with the effect size of 0.277, 0.132 and 0.551, respectively. The result also confirms that the attitude toward social distancing, perceived usefulness of social distancing and subjective norms significantly predict the Intention of individuals to use social distancing with the effect size of 0.355, 0.197 and 0.385, respectively. The nonsignificant association of PS with social distancing intention (IN) (H1b) is rendering the fact that attitude (AT) mediates the relationship between PS and IN; similarly, the nonsignificant association of FC with IN (H5) renders the fact that AT mediates the relationship between FC and IN.

Practical implications

The results of the study are helpful to policymakers to handle operations management of nudges like social distancing.

Originality/value

The research is one of its kind that explores the behavioral aspects of handling social nudges through FC.

Details

Journal of Facilities Management , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1472-5967

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 5 December 2023

Rafiq Ahmad and Muhammad Rafiq

The digital contents (d-contents) are vulnerable to various threats either natural or manmade. Digital preservation is the plethora of a wide array of strategies necessary for the…

Abstract

Purpose

The digital contents (d-contents) are vulnerable to various threats either natural or manmade. Digital preservation is the plethora of a wide array of strategies necessary for the long-term preservation of digital objects. This study was carried out to assess the digital preservation practices for information resources in university libraries of Pakistan.

Design/methodology/approach

A quantitative survey based on a structured questionnaire was carried out to conduct the study. The questionnaire containing two sets of strategies (general and technical) was distributed amongst the whole population and received 90% response rate.

Findings

Overall, progressive implementation of general digital preservation practices was noted in these libraries like checking the digital collections for viruses, keeping the digital media in fire/water/theft proof locations, restricting unauthorized access, maintaining ideal humidity and temperature, and checking the digital media for functionality. Amongst the technical practices, only replication was in practice at a progressive rate, followed by metadata recording and media refreshing that was sometimes practiced in these libraries. The other technical practices were rarely or never practiced in these libraries. Significant variances in general and technical digital preservation practices were noted based on their physical locations (regional distribution).

Research limitations/implications

The study contributes a comprehensive set of digital preservation practices divided into general and technical types to conduct similar studies in other parts of the world.

Practical implications

The findings stress the need for national and institutional policies, funding streams and skill enhancement of library staff.

Originality/value

The study fills the literature gap and contributes a comprehensive set of digital preservation practices divided into general and technical types to conduct similar studies in other parts of the world.

Peer review

The peer-review history for this article is available at: https://publons.com/publon/10.1108/OIR-02-2023-0074

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Access

Year

Last 6 months (150)

Content type

Earlycite article (150)
1 – 10 of 150