Search results

1 – 10 of 395
Article
Publication date: 1 July 2006

Roderic Broadhurst

Addresses the rapid expansion of computer connectivity and the opportunities provided for criminals to exploit security vulnerabilities in the online environment.

20716

Abstract

Purpose

Addresses the rapid expansion of computer connectivity and the opportunities provided for criminals to exploit security vulnerabilities in the online environment.

Design/methodology/approach

International efforts to combat cyber‐crime are reviewed by evaluating the forms of mutual legal assistance (MLA) now in place.

Findings

Cyber‐crime is often traditional crime (e.g. fraud, identify theft, child pornography) albeit executed swiftly and to vast numbers of potential victims, as well as unauthorised access, damage and interference to computer systems. Most detrimental are malicious and exploit codes that interrupt computer operations on a global scale and along with other cyber‐crimes threaten e‐commerce. The cross‐national nature of most computer‐related crimes have rendered many time‐honoured methods of policing both domestically and in cross‐border situations ineffective even in advanced nations, while the “digital divide” provides “safe havens” for cyber‐criminals. In response to the threat of cyber‐crime there is an urgent need to reform methods of MLA and to develop trans‐national policing capability.

Practical implications

The international response is briefly outlined in the context of the United Nations (UN) Transnational Organised Crime Convention (in force from September 2003) and the Council of Europe's innovative Cyber‐crime Convention (in force from July 2004). In addition, the role of the UN, Interpol, other institutions and bi‐lateral, regional and other efforts aimed a creating a seamless web of enforcement against cyber‐criminals are described.

Originality/value

The potential for potent global enforcement mechanisms are discussed.

Details

Policing: An International Journal of Police Strategies & Management, vol. 29 no. 3
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 3 October 2008

Esharenana E. Adomi and Stella E. Igun

The purpose of this paper is to describe cyber crime and techniques adopted for combating it in Nigeria.

4923

Abstract

Purpose

The purpose of this paper is to describe cyber crime and techniques adopted for combating it in Nigeria.

Design/methodology/approach

Reviews the state of cyber crime in Nigeria, and how it is being stemmed in the country.

Findings

The types of cyber crime in Nigeria are revealed together with the efforts geared towards combating/preventing cyber crime in the country. The paper also draws attention to the possibility of libraries that offer public internet access service being victims of cyber crime as well as unknown perpetrators. The paper recommends how cyber crime can be brought under control.

Originality/value

It reveals factors that contribute to perpetration of cyber crime in Nigeria and efforts being made to combat it. This will enable various countries, in developing and developed world, to be sensitized to the menace of cyber crime and take relevant steps to fight against it.

Details

The Electronic Library, vol. 26 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 10 October 2008

Adam Salifu

The global wave of information and communication technologies (ICT) development has become a strong driving force in almost every aspect of development. This paper aims to explore…

6295

Abstract

Purpose

The global wave of information and communication technologies (ICT) development has become a strong driving force in almost every aspect of development. This paper aims to explore the impact of internet crime on individuals, organisations, businesses and government agencies in both developed and developing countries with special reference to developing countries.

Design/methodology/approach

The analysis in this paper is based on extensive review of published research works, which provide theoretical and empirical evidence on the effects and impact of the internet on development.

Findings

The paper generally concludes that the internet is overwhelmingly a powerful tool for development. Paradoxically, the internet is a “double‐edged sword”, providing many opportunities for individuals and organisations to develop but at the same time, has brought with it new opportunities to commit crime. The paper argues that the internet presents new challenges to law enforcement in both developed and developing countries. However, developing countries suffer greatly from the activities of internet crime than their developed counterparts as developing countries have inadequate technology, infrastructure and insufficient law enforcement expertise.

Practical implications

This paper reminds individuals, organisations and policy makers alike that internet crime has become a global issue that requires the full participation and cooperation of both developed and developing countries at the international level, as internet crime investigations often require that evidence be traced and collected in more that one country. ICT industries should focus now in designing products that are resistant to crime and can facilitate detection and investigation of crime.

Originality/value

A major novelty of this paper is that it traces the historical evolution of the internet and then sketches out some of the innovations the internet has brought as well as considering the negative effects associated with this technology and its impact on development.

Details

Journal of Financial Crime, vol. 15 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 10 July 2023

Jawahitha Sarabdeen

The Regulatory Technology (RegTech) is said to be the use of information technology for regulatory monitoring, reporting and compliance. It is used to solve regulatory and…

Abstract

Purpose

The Regulatory Technology (RegTech) is said to be the use of information technology for regulatory monitoring, reporting and compliance. It is used to solve regulatory and compliance issues more effectively and efficiently. Regulators with the digitization of regulation and datafication of processes would get empowered to manage volumes of data. RegTech would assist them in understanding innovative products, transactions, risks, reporting and any market manipulation activities in real time. For successful use of RegTech, the regulatory framework of a country should be comprehensive to address issues that may arise in the use of RegTech. Thus, the purpose of this article is to analyze the adequacy of the Saudi Arabian legal framework to address RegTech adoption.

Design/methodology/approach

The researcher using logical analysis method analyzed the available laws and interpreted the law to see the applicability and the adequacy of laws to regulate the use of RegTech in Saudi Arabia. The content analysis was also used in this research to analyze the literature. This analysis helped to explain the available literature on the research topic and its relevancy and the gap in literature.

Findings

The analysis using the logical and content methodologies shows that Saudi Arabia has general law to address some of the issues that might arise in the adoption of RegTech. Nonetheless, amending some of the existing laws or introducing guidelines could help better uplift of RegTech and similar technologies in Saudi Arabia.

Originality/value

As businesses and regulatory authorities embrace technology for better and efficient delivery of services and products in Saudi Arabia, the research is timely to analyze the adequacy of the laws in Saudi Arabia for adoption of RegTech. In the use of RegTech, issues related to privacy, due diligence, accountability and transparency could arise, however, there is a dearth of literature in these areas relating to technology adoption.

Details

International Journal of Law and Management, vol. 65 no. 6
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 18 May 2021

Tom Kwanya, Angella C. Kogos, Lucy Wachera Kibe, Erick Odhiambo Ogolla and Claudia Onsare

Cyber-bullying is a form of harassment that is perpetrated using electronic media. The practice has become increasingly common especially with the growing ubiquity of social media…

Abstract

Purpose

Cyber-bullying is a form of harassment that is perpetrated using electronic media. The practice has become increasingly common especially with the growing ubiquity of social media platforms. Most cyber-bullying cases inevitably occur on Facebook because it is the most preferred social media platform. However, little is known about cyber-bullying research in Kenya. This paper aims to analyse the quantity, quality, visibility and authorship trends of scholarly publications on cyber-bullying from and/or about Kenya.

Design/methodology/approach

This study was conducted as a systematic literature review. A meta-analysis approach was used. Bibliometrics approaches were used to conduct the analysis. Data on the publications was collected from Google Scholar using Harzing's “Publish or Perish” software and then analysed and presented using Microsoft Excel, Notepad and VOSviewer.

Findings

The study yielded 359 research publications on cyber-bullying in Kenya. There was a gradual increment in the number of publications, peaking in 2018. Nearly half of the publications have not been cited indicating low uptake of research on cyber-bullying in Kenya. It also emerged that most of the research has been published on subscription channels thereby restricting their visibility, access and use. Minimal collaboration in research on cyber-bullying in Kenya was also observed since 67.4% of the publications were written by a single (one) author. The authors conclude that the quantity, quality and visibility of research on cyber-bullying in Kenya is low.

Originality/value

This is an empirical study. The findings can be used to promote and mainstream research on cyber-bullying in Kenya.

Details

Global Knowledge, Memory and Communication, vol. 71 no. 4/5
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 29 May 2009

Da‐Yu Kao and Shiuh‐Jeng Wang

Cyber technology is an extremely complicated field and the internet is being increasingly used as a place to commit crimes using personal computers, as well as network‐based…

3869

Abstract

Purpose

Cyber technology is an extremely complicated field and the internet is being increasingly used as a place to commit crimes using personal computers, as well as network‐based computers. Although cyber investigation is still in the early stages of its development, the burgeoning use of the internet has increased the necessity for digital investigations. The purpose of this paper is to increase awareness of the latest in digital comparison for cyber‐crime investigation with the studies of IP‐address and time in computer systems.

Design/methodology/approach

The approach to improving a cyber‐crime investigation is proposed in three stages: independent verification of digital clues, corresponding information from different sources, and preparation of a valid argument.

Findings

If the police and other authorities do not stay on top of this problem, they may lose the battle to control this cyber‐crime explosion. The paper discusses how Taiwanese police investigate cyber‐crime and the experience is able to propagate when analyzing IP‐address and time with crime‐case. It is believed that this proposed approach creates a comprehensive guide that provides support and assistance to crime investigators.

Practical implications

IP‐address and time, both indicated in this paper, are the key ingredients to identify the suspect in the beginning of investigation works. As the study shows: there is no guarantee that there always will be the “right” evidence to prove everything; investigators should try their utmost to avoid making mistakes; criminal investigators must find additional clues and proof to validate their suspicions.

Originality/value

This paper illustrates an approach to the investigation of cyber‐crime in the case of studying IP‐address and time. It is believed that the research can efficiently assist law enforcement officials in dealing with ever‐increasing cyber‐crime by using effective digital evidence.

Details

Policing: An International Journal of Police Strategies & Management, vol. 32 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 11 September 2009

Mohammad Mahabubur Rahman, Mohammad Aktaruzzaman Khan, Nour Mohammad and Mohammad Osiur Rahman

The purpose of this paper is to focus on existing law, the legal system and jurisprudence circling round territorial concepts.

Abstract

Purpose

The purpose of this paper is to focus on existing law, the legal system and jurisprudence circling round territorial concepts.

Design/methodology/approach

This paper is an opinion piece based on current and recent analysis of legal principle.

Findings

After the emergence of the internet as well as cyberspace, human activities are not confined solely to the physical world. They have been extended to a very different and peculiar non‐physical world. This world is everywhere and at the same time it is nowhere; and necessarily it is difficult to prescribe rules and enforce the same regarding cyberspace for its everywhere and nowhere proposition. The elementary concept of jurisprudence e.g. title, ownership and possession, etc. cannot be considered in the way we usually understand in case of real world. However, cyberspace has to be controlled by a legal framework that involves new ideas, leading to a new challenge in existing legal philosophy exclusively based on territorial concept.

Originality/value

Traditional territorial jurisprudence has to be revised in the light of cyber necessities arising out of high technological development. Moreover, certain new institutions have to be established in order to apply new principles in dispute settlement of cyber matters. This paper both identifies the need and options for the future.

Details

International Journal of Law and Management, vol. 51 no. 5
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 5 June 2020

Hassan Younies and Tareq Na'el Al-Tawil

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax…

1677

Abstract

Purpose

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax regulatory environment and incomprehensible cybersecurity policies have influenced the discussions.

Design/methodology/approach

This paper will first offer a global outlook of cybersecurity laws and legislation. The global outlook will present the basis for examining best practices that the UAE could emulate. The paper will then examine the legislative landscape of cyber laws in the UAE, including cross-country comparisons. The comparisons are critical, as the country’s cybercrime laws are in their infancy phase.

Findings

The UAE has taken decisive and proactive measures to deter the threat of cybercrimes and cyberattacks. The UAE strategy comprehensive strategy has been effective in protecting the economy and populations from the adverse effects of cybercrimes. The success lies in the enactment of comprehensive and streamlines laws and regulations with harsher penalties. The stringent legal measures, including longer jail terms, stiffer fines and deportation of foreigners, have ensured robust deterrence to cybercriminals.

Originality/value

The analysis has shown that the UAE has a higher score of preparedness against cybercrimes and cyberattacks. The UAE has specifically crafted a broader and effective legislative framework of cybercrime laws. Although the UAE has comprehensive cybercrime laws, the remarkable level of technological advances in the country makes citizens and businesses lucrative targets. The UAE now has the burden of doubling down its legal efforts to deter emerging cybersecurity risks.

Details

Journal of Financial Crime, vol. 27 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 6 July 2015

Rick Brown and Samantha Gillespie

– The purpose of this paper is to explore the problems that arise when undertaking a financial investigation that involves tracing assets in foreign jurisdictions.

886

Abstract

Purpose

The purpose of this paper is to explore the problems that arise when undertaking a financial investigation that involves tracing assets in foreign jurisdictions.

Design/methodology/approach

The paper is based on a secondary analysis of data collected as part of a qualitative study of the role of financial investigation in tackling organised crime. This was based on interviews with investigating officers, financial investigators and Crown Prosecution Service representatives associated with 60 cases. Of the 60 cases, 36 were found to have an international dimension.

Findings

The study found a number of problems with undertaking overseas financial investigations. These included problems with the letter of request process, difficulties tracking assets in some countries and problems with tracing funds transferred through money service bureaux. Informal contact on a police-to-police basis was generally considered an effective means of improving the quality of information received.

Research limitations/implications

This study is based on just 60 cases of organised crime in which financial investigation was used. The extent to which these findings can be generalised to other cases is unclear.

Practical implications

The study highlights the most common obstacles to overseas financial investigation that should be addressed. In addition, the importance of informal contact with overseas police jurisdictions may highlight a means of improving requests for assistance.

Originality/value

This paper provides an important insight into the views of operational staff undertaking overseas financial investigations and as such highlights the particular difficulties in this work.

Details

Journal of Money Laundering Control, vol. 18 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 20 July 2023

Douglas Cumming, Sofia Johan and Robert Reardon

This paper aims to provide an in-depth examination of the emergent state of financial technology (fintech), particularly emphasizing capital-raising innovations and their…

2068

Abstract

Purpose

This paper aims to provide an in-depth examination of the emergent state of financial technology (fintech), particularly emphasizing capital-raising innovations and their implications for international business.

Design/methodology/approach

Using the highly influential articles published in fintech, the authors identify the advantages and disadvantages of each significant fintech in the credit, deposit and capital-raising services sector. The authors assess the adoption of these services and the international firm-level implications of their use.

Findings

This study highlights fintech’s role in fostering entrepreneurial internationalization, with a particular focus on the impact of crowdfunding, peer-to-peer lending and online banking. A thorough analysis of Google Scholar citations uncovers research gaps and unveils emerging trends bridging international business and fintech. Furthermore, the examination of regulatory efforts presents evidence of a robust positive relationship between global e-commerce legislation and fintech adoption, demonstrating the interconnected nature of these elements in the world of international business.

Research limitations/implications

Fintech research in international business has only taken off in the last five years. Innovations and regulatory developments are continuously evolving.

Originality/value

This study emphasizes the significance of fintech in international business research, addressing its implications on regulatory environments, entrepreneurial internationalization and multinational corporations’ global strategies. By investigating the synergies and applications of various fintech types, the research provides valuable insights for scholars and practitioners, contributing to the advancement of knowledge in the field of international finance.

Details

Multinational Business Review, vol. 31 no. 3
Type: Research Article
ISSN: 1525-383X

Keywords

1 – 10 of 395