Search results

1 – 10 of 184
Content available
Book part
Publication date: 9 October 2020

Abstract

Details

Corporate Fraud Exposed
Type: Book
ISBN: 978-1-78973-418-8

Open Access
Article
Publication date: 22 December 2022

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun

This study aims to investigate the feasibility of employing a multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation. The…

Abstract

Purpose

This study aims to investigate the feasibility of employing a multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation. The formulated objectives are the minimisation of the total allocation cost of the anti-fraud capacities and the maximisation of the forensic accounting capacities in all cyberfraud incident prone spots.

Design/methodology/approach

From the literature survey conducted and primary qualitative data gathered from the 17 licenced banks in South Africa on fraud investigators, the suggested fraud investigators are the organisation’s finance department, the internal audit committee, the external risk manager, accountants and forensic accountants. These five human resource capacities were considered for the formulation of the multi-objectives integer programming (MOIP) model. The MOIP model is employed for the optimisation of the employed capacities for cyberfraud mitigation to ensure the effective allocation and utilisation of human resources. Thus, the MOIP model is validated by a genetic algorithm (GA) solver to obtain the Pareto-optimum solution without the violation of the identified constraints.

Findings

The formulated objective functions are optimised simultaneously. The Pareto front for the two objectives of the MOIP model comprises the set of optimal solutions, which are not dominated by any other feasible solution. These are the feasible choices, which indicate the suitability of the MOIP to achieve the set objectives.

Practical implications

The results obtained indicate the feasibility of simultaneously achieving the minimisation of the total allocation cost of the anti-fraud capacities, or the maximisation of the forensic accounting capacities in all cyberfraud incident prone spots – or the trade-off between them, if they cannot be reached simultaneously. This study recommends the use of an iterative MOIP framework for decision-makers which may aid decision-making with respect to the allocation and utilisation of human resources.

Originality/value

The originality of this work lies in the development of multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 1 February 2023

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

4201

Abstract

Purpose

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

Design/methodology/approach

The study uses a qualitative approach involving the use of structured questionnaires. The questionnaires were made available to the staff of 17 licensed banks in South Africa who deal with management, operation, administration and banking services. Two hypotheses were formulated and non-parametric statistical analyses involving the use of Chi-square test, Fischer’s Exact test and Spearman’s correlation were carried out. The two hypotheses formulated were tested to draw a conclusion.

Findings

The results obtained indicate that the impact of cyberfraud in the South African banking industry is highly significant and has affected the reputation of some of the banks. This calls for the need to review the diverse ways of curbing cyberfraud to lessen their impact and that of associated fraud risks on the banking operation.

Practical implications

This study provides an analysis on the relationship cyberfraud occurrences and the reputation of South African banks. The implementation of the recommendations may reinforce the existing security measures in the fight against cyberfraud.

Originality/value

The novelty of this study lies in the fact that the assessment of the impact of cyberfraud on the banking industry in South Africa has not been sufficiently highlighted by the existing literature.

Details

Journal of Financial Crime, vol. 31 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 7 January 2019

Monica T. Whitty

This paper aims to develop a theoretical framework to predict susceptibility to cyber-fraud victimhood.

12457

Abstract

Purpose

This paper aims to develop a theoretical framework to predict susceptibility to cyber-fraud victimhood.

Design/methodology/approach

A survey was constructed to examine whether personality, socio-demographic characteristics and online routine activities predicted one-off and repeat victimhood of cyber-fraud. Overall, 11,780 participants completed a survey (one-off victims, N = 728; repeat victims = 329).

Findings

The final saturated model revealed that psychological and socio-demographic characteristics and online routine activities should be considered when predicting victimhood. Consistent with the hypotheses, victims of cyber-frauds were more likely to be older, score high on impulsivity measures of urgency and sensation seeking, score high on addictive measures and engage in more frequent routine activities that place them at great risk of becoming scammed. There was little distinction between one-off and repeat victims of cyber-frauds.

Originality/value

This work uniquely combines psychological, socio-demographic and online behaviours to develop a comprehensive theoretical framework to predict susceptibility to cyber-frauds. Importantly, the work here challenges the current utility of government websites to protect users from becoming scammed and provides insights into methods that might be used to protect users from becoming scammed.

Details

Journal of Financial Crime, vol. 26 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Content available
Article
Publication date: 3 July 2017

Shima D. Keene

606

Abstract

Details

Journal of Financial Crime, vol. 24 no. 3
Type: Research Article
ISSN: 1359-0790

Content available
Book part
Publication date: 9 October 2020

Abstract

Details

Corporate Fraud Exposed
Type: Book
ISBN: 978-1-78973-418-8

Open Access
Article
Publication date: 28 September 2020

Adeku Salihu Ohiani

The banking system in Nigeria is gradually moving away from transactions “across the counter” to the fingertips of the customers with the adoption of modern technology. However…

12370

Abstract

Purpose

The banking system in Nigeria is gradually moving away from transactions “across the counter” to the fingertips of the customers with the adoption of modern technology. However, every development comes with its “pros and cons” because as technology innovation has improved service delivery and profitability of banks in Nigeria, crimes are also at a high side. To activating the minds of bank operators about the importance of technology adoption and its shortcomings, this paper aims to examine the prospects and challenges of technology innovation in the Nigerian banking system.

Design/methodology/approach

Secondary data were retrieved from the annual reports of Central Bank of Nigeria (CBN) and Nigeria Deposit Insurance Corporation (NDIC) from 2013 to 2017 to know the interaction between e-banking platforms and performance of banks in Nigeria. The study administered a questionnaire to the bank customers in Lagos Island, Nigeria to understand their perception towards e-banking. This study is anchored on prospect theory to ascertain the risk orientation of the Nigerian banks regarding how they adopt technology and reasoned action theory to understand the intention of bank customers in using the opportunities of e-banking copiously.

Findings

The findings of this study reveal the migration from cheques to electronic related transactions. It further indicates a high rate of fraud committed through those channels. The analysis of primary data shows that innovation adoption, service quality, cybercrime have significant relationship with the competitiveness of banks, the intention of bank customers, and perception of customers towards online services. However, the rate of frauds does not have significant relationship with the usage of mobile banking products which further studies can critically examine.

Originality/value

This study has revealed available huge potentials in the e-banking that are yet to be used in Nigeria. However, consumer orientation needs to be worked on, because, customers still have the fear that cybercrime is mostly committed via e-banking platforms. Unlike in developed countries whereby quite good numbers of customers make use of e-banking platforms, majority of bank customers in Nigeria still prefer using manual methods and the world is already on the verge of moving into 5 G from 4 G.

Details

Rajagiri Management Journal, vol. 15 no. 1
Type: Research Article
ISSN: 0972-9968

Keywords

Open Access
Article
Publication date: 17 April 2023

Maria Krambia Kapardis and Michael Levi

The purpose of this paper is to identify if fraud theory models suggested over the years are applicable to match-fixing and if so, whether the Krambia-Kapardis’ (2016) holistic…

1702

Abstract

Purpose

The purpose of this paper is to identify if fraud theory models suggested over the years are applicable to match-fixing and if so, whether the Krambia-Kapardis’ (2016) holistic fraud and corruption prevention model can be used to reduce significantly match-fixing in football.

Design/methodology/approach

An online survey was developed by the authors and was administered to football stakeholders in Cyprus, namely, players, referees, coaches and team management.

Findings

The research questions, who are the initiators of match-fixing, why is match-fixing taking place and what is the best way to prevent or reduce match-fixing, have been answered, and these findings have enabled the authors to make policy recommendations.

Research limitations/implications

The survey considered match-fixing in only one sport (football) while the number of respondent categories and the 335 usable questionnaires returned did not allow advanced statistical analysis of the data obtained.

Practical implications

The findings point to the need both for ethics and moral values to be installed in all the stakeholders through training and continuing education. It is also suggested that teams/clubs and related associations acting as regulators ought to implement governance principles and ethical programs, including whistleblowing lines and appoint integrity officers to minimize the match-fixing phenomenon. Furthermore, society, as well as government, sport regulators and sponsors, ought to encourage and demand fair play and integrity in sport through improved measures of governance and accountability and the implementation of ethical audits and public disclosure of audited financial statements of teams. Finally, sports integrity ought to be embedded in school curriculum from a very young age.

Originality/value

To the best of the authors’ knowledge, this is an original contribution to knowledge that has impact on the future of sporting fairness and social legitimacy.

Details

Journal of Financial Crime, vol. 30 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Content available
Article
Publication date: 21 March 2023

Abel Yeboah-Ofori and Francisca Afua Opoku-Boateng

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their…

Abstract

Purpose

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their Internet with small and medium scale enterprises (SMEs) and third-party vendors to improve business growth and increase global market share, including changing organizational requirements and business process collaborations. Benefits include a reduction in the cost of production, online services, online payments, product distribution channels and delivery in a supply chain environment. However, the integration has led to an exponential increase in cybercrimes, with adversaries using various attack methods to penetrate and exploit the organizational network. Thus, identifying the attack vectors in the event of cyberattacks is very important in mitigating cybercrimes effectively and has become inevitable. However, the invincibility nature of cybercrimes makes it challenging to detect and predict the threat probabilities and the cascading impact in an evolving organization landscape leading to malware, ransomware, data theft and denial of service attacks, among others. The paper explores the cybercrime threat landscape, considers the impact of the attacks and identifies mitigating circumstances to improve security controls in an evolving organizational landscape.

Design/methodology/approach

The approach follows two main cybercrime framework design principles that focus on existing attack detection phases and proposes a cybercrime mitigation framework (CCMF) that uses detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface. The methods and implementation processes were derived by identifying an organizational goal, attack vectors, threat landscape, identification of attacks and models and validation of framework standards to improve security. The novelty contribution of this paper is threefold: first, the authors explore the existing threat landscapes, various cybercrimes, models and the methods that adversaries are deploying on organizations. Second, the authors propose a threat model required for mitigating the risk factors. Finally, the authors recommend control mechanisms in line with security standards to improve security.

Findings

The results show that cybercrimes can be mitigated using a CCMF to detect, assess, analyze, evaluate and respond to cybercrimes to improve security in an evolving organizational threat landscape.

Research limitations/implications

The paper does not consider the organizational size between large organizations and SMEs. The challenges facing the evolving organizational threat landscape include vulnerabilities brought about by the integrations of various network nodes. Factor influencing these vulnerabilities includes inadequate threat intelligence gathering, a lack of third-party auditing and inadequate control mechanisms leading to various manipulations, exploitations, exfiltration and obfuscations.

Practical implications

Attack methods are applied to a case study for the implementation to evaluate the model based on the design principles. Inadequate cyber threat intelligence (CTI) gathering, inadequate attack modeling and security misconfigurations are some of the key factors leading to practical implications in mitigating cybercrimes.

Social implications

There are no social implications; however, cybercrimes have severe consequences for organizations and third-party vendors that integrate their network systems, leading to legal and reputational damage.

Originality/value

The paper’s originality considers mitigating cybercrimes in an evolving organization landscape that requires strategic, tactical and operational management imperative using the proposed framework phases, including detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface, which is currently inadequate.

Details

Continuity & Resilience Review, vol. 5 no. 1
Type: Research Article
ISSN: 2516-7502

Keywords

Content available
Book part
Publication date: 18 January 2021

Abstract

Details

Contemporary Issues in Public Sector Accounting and Auditing
Type: Book
ISBN: 978-1-83909-508-5

1 – 10 of 184