Search results

1 – 10 of over 18000
Book part
Publication date: 1 August 2017

Larry D. Compeau

To examine bad credit experiences in the context of identity to understand the entanglement between bad credit and the deformation of identity.

Abstract

Purpose

To examine bad credit experiences in the context of identity to understand the entanglement between bad credit and the deformation of identity.

Methodology/approach

A qualitative method using depth interviews and hermeneutical analysis.

Findings

Bad credit is a major life event and plays a critical role in identity. By restricting or eliminating identity construction and maintenance through consumption, identities are deformed. Consumer identities are deformed as they are consumed by the identity deformation process as normal patterns of consumption that have built and supported their identities are disrupted and demolished. Bad credit is overwhelmingly consumptive of consumers – it consumes their time, energy, patience, lifestyle, relationships, social connections, and perhaps most importantly, it consumes their identity as it deforms who they are.

Research limitations/implications

Researchers need to examine more closely not just the creation and maintenance of identity, but also how identity is deformed and deconstructed through consumption experiences that can no longer be enjoyed.

Social implications

Government agencies may want to reexamine policies toward the granting of credit to reduce the incidence of loading up consumers with credit they are not able to pay for. The deformation of identity may result in anti-social behavior, although our study does not address this directly.

Originality/value

This study is different from previous work in several ways. We focus on identity deformation due to bad credit. By analyzing a crisis response that transcends the specific impetus of bad credit, we extend identity theory by developing an insight into “identities-in-crisis.” We also provide a theoretical framework and explore how consumers’ identities are deformed and renegotiated.

Details

Qualitative Consumer Research
Type: Book
ISBN: 978-1-78714-491-0

Keywords

Article
Publication date: 9 October 2009

Kayvan Miri‐Lavassani, Vinod Kumar, Bahar Movahedi and Uma Kumar

Though many studies and reports have been published about the scale of identity fraud (IDF), no work has been done on developing models to measure IDF. The purpose of this paper…

1664

Abstract

Purpose

Though many studies and reports have been published about the scale of identity fraud (IDF), no work has been done on developing models to measure IDF. The purpose of this paper is to propose a measurement model for IDF and test the validity of that measurement model.

Design/methodology/approach

After providing a background on the concepts of IDF, the paper discusses the related term, identity theft. Next, a measurement model is developed, based on the current practice of measurement of IDF in four countries. Exploratory factor analysis (EFA) is used in identifying the indicators and factors of IDF. After the EFA is conducted, confirmatory factor analysis is employed to test the validity of the measurement model. These tests are conducted using the data collected from Canadian financial institutions.

Findings

The review of the current empirical studies suggests that IDF should be assessed using a measurement model with 33 indicators to measure five factors of IDF. However, the analysis of Canadian financial institutions suggests that a measurement model that includes 27 indicators and four factors is most appropriate for the data.

Research limitations/implications

The measurement model developed in the present paper is based on an examination of a sample of financial institutions in Canada. Hence, the results of this paper cannot be generalized to organizations in other sectors of the economy. Further studies in other sectors of the economy are required to identify industry‐specific measurement model.

Practical implications

This paper is the first approach toward developing a model for measuring IDF.

Originality/value

This paper is the first study that attempts to scientifically identify and validate a measurement system in the area of IDF.

Details

Journal of Financial Crime, vol. 16 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 28 September 2012

Katerina Berezina, Cihan Cobanoglu, Brian L. Miller and Francis A. Kwansa

The primary purpose of this study is to investigate the impact of information security breaches on hotel guests' perceived service quality, satisfaction, likelihood of…

10654

Abstract

Purpose

The primary purpose of this study is to investigate the impact of information security breaches on hotel guests' perceived service quality, satisfaction, likelihood of recommending a hotel and revisit intentions.

Design/methodology/approach

Five‐hundred seventy‐four US travelers participated in this experimental study. The respondents were exposed to one of three different scenarios: “negative”, where an information security breach happened in the hotel where a person stayed last and guest information was compromised; “neutral”, where an information security breach happened and guest information remained safe; and “positive”, where participants were told that the hotel where they last stayed successfully passed a comprehensive security audit, meaning that their guest information is properly handled and secured.

Findings

The results of the study revealed a significant impact of the treatments on three of the four outcome variables: satisfaction, likelihood of recommending a hotel, and revisit intentions. Information security breach scenarios resulted in a negative impact on the outcome variables regardless of whether or not the guest's credit card information was compromised. A positive scenario revealed a significant increase in guest satisfaction and revisit intentions scores.

Practical implications

The findings of the study provide clear indication that hotel operators must continually strive to keep the sensitive data that is collected from their guests secure, and that failure to do so can have significant negative ramifications on current and future guests. The results also suggest that hotels should openly publicize their achievements in the field of PCI compliance.

Originality/value

The study contributes to the body of knowledge on the importance of credit card information security breaches to hotel guest satisfaction and future behavior. To date, this is the only study that has investigated this topic in the hospitality industry, and it therefore makes a significant improvement towards the understanding of the impact of information security breach on hotel guest perceptions and future intentions.

Article
Publication date: 27 July 2021

Girish Joshi, Bindya Kohli and Sandeep Nalawade

This paper aims to investigate whether small finance banks (SFBs) in India are working towards financial inclusion through qualitative studies.

Abstract

Purpose

This paper aims to investigate whether small finance banks (SFBs) in India are working towards financial inclusion through qualitative studies.

Design/methodology/approach

This paper uses a phenomenological approach in which semi-structured interviews were conducted with the employees of two SFBs in Mumbai with different specializations. Employee experience was captured to grasp, interpret and code data for the creation of different themes.

Findings

This research shows that the current literature on financial inclusion is inadequate to explain the behavior of the needy in India. Study found multiple themes of financial inclusion, namely, financial literacy, self-esteem, use of technology, prompt repayment, credit identity, cross-referencing and financial stability. Although overall results are positive, to generalize the results, SFBs need to spend some more time in business. The findings of this study can be of global benefit to micro-finance organizations of a similar scale to achieve financial inclusion and business improvement.

Research limitations/implications

This qualitative study was performed at a single location and with a limited sample size, which underlines the need for repeated exercises at multiple locations with a larger sample size to establish a broader logical generality. It also points out the need for a study of employee themes to enhance the business processes of SFBs.

Originality/value

To the best of the authors’ knowledge, this qualitative study is first attempt to figure out the extent of work done by SFBs in India in promoting financial inclusion. Themes related to financial inclusion can provide further thought process for policymakers for financial inclusion and business improvement. Findings refer not only to Indian organizations but also to small banks around the world to recognize the underpinnings of financial inclusion and what small banks and micro-finance institutions can do to make it meaningful.

Details

Qualitative Research in Financial Markets, vol. 13 no. 5
Type: Research Article
ISSN: 1755-4179

Keywords

Article
Publication date: 18 October 2018

Katherine Taken Smith, Amie Jones, Leigh Johnson and Lawrence Murphy Smith

Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology…

2363

Abstract

Purpose

Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology management. Cybercrime often not only results in stolen assets and lost business but also damages a company’s reputation, which in turn may affect the company’s stock market value. This is a serious concern to company managers, financial analysts, investors and creditors. This paper aims to examine the impact of cybercrime on stock prices of a sample of publicly traded companies.

Design/methodology/approach

Financial data were gathered on companies that were reported in news stories as victims of cybercrime. The market price of the company’s stock was recorded for several days before the news report and several days after. The percentage change in the stock price was compared to the change in the Dow Jones Industrial average to determine whether the stock price increased or decreased along with the rest of the market.

Findings

Stock prices were negatively affected in all time periods examined, significantly so in one period.

Practical implications

This paper describes cases concerning cybercrime, thereby bringing attention to the value of cybersecurity in protecting computers, identity and transactions. Cyber security is necessary to avoid becoming a victim of cybercrime. Specific security improvements and preventive measures are provided within the paper. Preventive measures are generally less costly than repairs after a cybercrime.

Originality/value

This is an original manuscript that adds to the literature regarding cybercrime and preventive measures.

Details

Journal of Information, Communication and Ethics in Society, vol. 17 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 8 February 2021

Antonio Zerafa, James Banks and Jaime Waters

The purpose of this paper is to explore the challenges of countering fraud in Malta’s remote gaming industry.

Abstract

Purpose

The purpose of this paper is to explore the challenges of countering fraud in Malta’s remote gaming industry.

Design/methodology/approach

Six individuals from three major stakeholders in Malta’s remote gaming industry were interviewed for this study.

Findings

The interviewees report that a multitude of fraudulent activities are present in Malta’s remote gaming industry. This includes identity fraud, credit card fraud, bonus abuse and collusion and chip dumping. Participants indicate that crimes of fraud often go unreported and unrecorded, resulting in a limited evidence base upon which to develop holistic and effective counter-fraud measures.

Research limitations/implications

The research sample is small, although this study is the first to examine the perspectives of key stakeholders working in one of the world’s largest remote gaming industries. Findings are of relevance to regulated online gambling markets across the globe.

Practical implications

The study suggests that better intelligence sharing amongst gambling operators and regulators can serve to enhance counter-fraud measures both locally and internationally.

Originality/value

The reputational and commercial imperative of gambling operators and regulators means that research studies pertaining to the topic of crime in the remote gaming industry that incorporate their perspectives are rare.

Details

Journal of Financial Crime, vol. 28 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 9 May 2008

James F. Gilsinan, James Millar, Neil Seitz, James Fisher, Ellen Harshman, Muhammad Islam and Fred Yeager

While the “Information Age” has provided the technological tools to “democratize” data and make it widely available to a vast audience of knowledge consumers, ironically it has…

1938

Abstract

Purpose

While the “Information Age” has provided the technological tools to “democratize” data and make it widely available to a vast audience of knowledge consumers, ironically it has also provided the materials for a tapestry of rules, regulations and processes that make it more difficult for individuals to access information relevant to both their public and private lives. The purpose of this paper is to examine the role of the private sector in the control and policing of financial crime, and provide an empirical and theoretical framework for understanding the complex tensions created by the simultaneous expansion of both data sources and technologies to collect and format data to create marketable information “products.”

Design/methodology/approach

Three primary methods were used to gather the data for this research. Extensive literature reviews were conducted together with an analysis of existing data bases. Finally, a number of interviews were done with various corporate managers to ascertain their views of the existing climate of regulation and/or to determine their approach to monitoring financial crime.

Findings

Regarding the private sector's role in the control of financial crime, this research found five distinct roles; each with its own dynamics and implications for successful suppression of unlawful conduct. The five roles are grudging informant, enthusiastic intelligence operative, agent provocateur, cop on the take, and officer friendly. A calculus of incentives and disincentives determines which role will be adopted by the private sector.

Originality/value

Since this paper was exploratory in nature, resulting in a new taxonomy of compliance types, more in depth research ascertaining the empirical validity of each type would be in order. Such knowledge can help policy makers formulate rules and regulations that will enhance public/private partnerships in the control of financial crime.

Details

Journal of Financial Crime, vol. 15 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 2 October 2024

Kiran Joshi and Priyanka Kaushik

The perception of a situation or reality determines how one responds and awareness is the first step towards understanding, knowing or recognizing it. The majority of the public…

Abstract

The perception of a situation or reality determines how one responds and awareness is the first step towards understanding, knowing or recognizing it. The majority of the public and the police may be familiar with the phrase ‘cybercrime’, but all of them are fully informed of the nature and scope of these crimes, as well as of the cybercriminals and cyber victims, which has an impact on how they see these issues. This study's main goal was to examine the perception and awareness of cybercrime among undergraduate youth studying in BBA or BCA courses. In this study, we discovered that young people's responses to cybercrime mostly depend on their perceptions of it and their awareness level. To accomplish the study's objective, a thorough examination of existing literature was undertaken. Primary data of 200 students were collected through Google Forms. Percentile analysis, correlation analysis and t-test are done to test the hypotheses. The results of this study may help college administrators better comprehend the mindset of today's youth as they develop laws and policies aimed at reducing cybercrime among students. The results of this study show that the youngsters surveyed have high levels of awareness and a good perception.

Details

Resilient Businesses for Sustainability
Type: Book
ISBN: 978-1-83797-803-8

Keywords

Article
Publication date: 30 October 2009

Yelena Tsarenko and Dewi Rooslani Tojib

This paper aims to develop a customer typology based on consumer attitude towards information privacy and examine the driving factors of privacy concern.

2826

Abstract

Purpose

This paper aims to develop a customer typology based on consumer attitude towards information privacy and examine the driving factors of privacy concern.

Design/methodology/approach

A sample of 456 Australian consumers who have applied for a credit card or mortgage is used in this study. Consumer concern with privacy statements, the privacy legislation at the federal level, trust and the willingness to disclose personal information for some form of compensation are used as drivers of consumer privacy in regression analysis. These variables are used in cluster analysis in order to segment financial consumers.

Findings

The results indicate that that the level of privacy concern is primarily driven by trust that far outweighs any concerns with privacy statements and the provision of nationally legislated safeguards. Furthermore, a cluster analysis reveals three distinctive customer segments in the domain of financial services: the pragmatist, indifferent, and competent.

Originality/value

This study is undertaken to advance our knowledge on consumer privacy concerns in the context of financial services and to segment financial services customers in relation to the disclosure of personal information. The study contributes to the literature and enhances our understanding not only on drivers of consumer privacy but also on specific areas of privacy concern among various customer segments.

Details

Journal of Consumer Marketing, vol. 26 no. 7
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 1 January 2006

Robert E. Holtfreter and Kristy Holtfreter

To examine identity theft in the United States and to provide an overview and assessment of recent legislation designed to assist identity theft victims and punish offenders.

838

Abstract

Purpose

To examine identity theft in the United States and to provide an overview and assessment of recent legislation designed to assist identity theft victims and punish offenders.

Design/methodology/approach

Statistics on the prevalence of identity theft are included, as well as details from a fact‐based, fairly typical case of identify theft. An overview of the Fair and Accurate Credit Transactions Act (FACTA) and the Identity Theft Penalty Act (ITPEA) are provided, and the provisions of each act are analyzed.

Findings

It will take time to determine to what extent the provisions in FACTA and ITPEA will prevent or reduce identity theft. No doubt, in the future, there will amendments to both acts.

Research limitations/implications

Future empirical studies could inform all interested parties by examining the impact of the FACTA and ITPEA over a multi‐year time frame. Moreover, cross‐cultural comparisons focusing on the ways in which other nations address identity theft will also shed light on the issues discussed herein.

Originality/value

The topic of identity theft remains salient to researchers as well as criminal justice practitioners and victim advocates. Public education to increase knowledge of identity theft, and to provide information and resources for victims, will be critical in the future.

Details

Journal of Financial Crime, vol. 13 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of over 18000