Search results

1 – 10 of 17
Article
Publication date: 13 November 2023

Tareq Na’el Al-Tawil and Salam Abdallah

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Abstract

Purpose

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Design/methodology/approach

The analysis begins with a review of the nature of cyberbullying, focusing primarily on key concepts, underlying risk factors, forms of cyberbullying and adverse effects. Background information about the nature of cyberbullying will then lay the foundation for the subsequent sections of the analysis, which will focus on preventive strategies and legislative measures. The second section of the analysis will entail a review of the legislative framework for cyberbullying in the UAE. The goal here is to examine how the UAE is responding to the emerging threat of cyberbullying in its jurisdiction. The next section will then shift gears to interventions and strategies being implemented at the global level. A global perspective is central to comparing practices in the UAE to international standards and regulations.

Findings

Findings from the analysis have shown that the UAE has the most robust and comprehensive cyberbullying laws internationally. Nonetheless, the New Cybercrimes Law is ambiguous, and it is not expressively specific to cyberbullying. The law does not have a clear definition of cyberbullying, as well as the scope of its application to specific cases involving students. A comparative analysis across jurisdictions has revealed that most countries neither have specific cyberbullying laws nor explicitly define the phenomenon in existing laws. Thus, cyberbullying is a gray area in the UAE national law, requiring a clear definition and scope of application. The courts will establish case law that will finally address the current definitional challenges and extend of applying the New Cybercrimes Law.

Originality/value

The analysis concludes with the application of international best standards and practices to the UAE context, focusing specifically on how to strengthen laws and procedures in the UAE.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 17 January 2022

Yang Li, Jiaze Li, Qi Fan and Zhihong Wang

The teenager community is the most affected community by cybercrime in the COVID-19 era. Increasing social networks and facilitating teenager access to the Internet have increased…

Abstract

Purpose

The teenager community is the most affected community by cybercrime in the COVID-19 era. Increasing social networks and facilitating teenager access to the Internet have increased the probability of cybercrimes. On the other hand, entertainment such as mobile and computer games is top-rated among teenagers. Teenagers' tendency to cybercrime may be influenced by individual, parent, social, economic and political factors. Studying the impact of social networks, mobile games and parents' religious attitudes on teenagers' tendency to cybercrimes in the COVID-19 era is the primary goal of this paper.

Design/methodology/approach

The outbreak of COVID-19 caused a considerable change in the world and the lifestyle of all people. Information and Communication Technology (ICT) was also affected by the special conditions of this virus. Changes in ICT and rapid access to it have empowered individuals and organizations, and people have increased civic participation and interaction through ICT. However, the outbreak of COVID-19 has created new challenges for the government and citizens and may cause new crimes. Cybercrime is a type of crime that occurs in a cyber environment. These crimes range from invasions of privacy to crimes in which the offender vaguely paralyzes the macroeconomic. In this research, 265 students of high schools and universities are used for collecting data by utilizing a survey. Measuring actions have been done in all surveys employing a Likert scale. The causal pattern is assessed through a constructional equation modeling procedure to study the scheme's validity and reliability.

Findings

The outcomes have indicated that social networks have no significant relationship with teenagers' tendency to cybercrimes in the COVID-19 era. Mobile games have a mild effect on teenagers' tendency to cybercrimes in the COVID-19 era, and parents' religious attitudes significantly impact teenagers' tendency to cybercrimes in the COVID-19 era.

Research limitations/implications

Current research also has some restrictions that must be noticed in assessing the outcomes. First, sample research was selected from high schools and universities in one city. So, the size of the model is small, and the generalization of results is limited. Second, this research may have ignored other variables that affect the tendency of teenagers' to cybercrime. Future researchers intend to investigate the parents' upbringing system's impact on teenager's trend to cybercrime in the COVID-19 era. Future research can also examine practical factors such as parental upbringing, attitudes toward technology development and virtual addiction in the COVID-19 era.

Originality/value

In this study, teenagers' tendency to cybercrimes in the COVID-19 era is investigated, and a procedure is applied depending on a practical occasion. This article's offered sample provides a perfect framework for influencing parents' social networks, mobile games and religious attitudes on teenagers' tendency to cybercrimes in the COVID-19 era.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 6 July 2023

Jacobus Gerhardus J. Nortje and Daniel Christoffel Myburgh

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of…

Abstract

Purpose

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of such a warrant in South African criminal cases.

Design/methodology/approach

This paper provides a brief overview of international and local impediments, followed by a detailed discussion of the implications of these impediments and how it is approached in various jurisdictions. The methodology of this paper consists of a literature review.

Findings

Addressing the impediments in the compilation of the application and the warrant will be beneficial for forensic investigators, the South African Police Service (SAPS) and the administration of justice in South Africa.

Research limitations/implications

Search and seizures for digital evidence form part of civil, regulatory and criminal search and seizures. This study focuses on the search and seizure of digital evidence in criminal matters pursuant to mainly the provisions of the Criminal Procedure Act 51 of 1977 and the Cybercrimes Act 19 of 2020.

Originality/value

The originality of this paper lies in the approach to the drafting of applications for search and seizure warrants for digital information in South Africa. The contribution of the study is that, by using this approach, the SAPS can address the impediments during the application and compilation of the warrants, which would enhance the quality of investigations and contribute to the successful investigation and prosecution of crime in South Africa.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 22 March 2023

Rami K. Isaac and Sahar Dodeen

This study aims to investigate the tourism stakeholders' opinions about developing smart tourism (ST) in the West Bank, Palestine. This research fulfils intriguing gaps in the…

Abstract

Purpose

This study aims to investigate the tourism stakeholders' opinions about developing smart tourism (ST) in the West Bank, Palestine. This research fulfils intriguing gaps in the literature on stakeholders' perceptions and views on developing ST in the West Bank, Palestine.

Design/methodology/approach

The research study employed a qualitative methodology using semi-structured interviews with nineteen respondents. All data collected were in April and May 2022.

Findings

The findings show that the understanding of ST-related stakeholders in the West Bank is mainly linked to information communication and technology, digitalisation, and online use of technology within the tourism industry. Moreover, the results show the high potential of developing the ST industry in the West Bank. However, this study revealed that challenges could affect the West Bank's development at different levels, such as managerial, technological, awareness, public sector restrictions, infrastructural, financial and political challenges.

Research limitations/implications

This research has some shortcomings. The first restriction of this study was the political restrictions and the checkpoints, which limited the reach of some of the participants who reside in Jerusalem or other cities outside of the West Bank, which delayed the time of the interviews or converted it to be done through a digital platform. Secondly, the sample of this study was small in tourism stakeholders in the West Bank.

Originality/value

To the author's knowledge, this paper is the first on ST from the stakeholders' perspectives. Therefore, this study has set the first step in closing the existing gap in the literature.

Details

Management & Sustainability: An Arab Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2752-9819

Keywords

Article
Publication date: 2 August 2023

Atika Ahmad Kemal and Mahmood Hussain Shah

While the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited…

Abstract

Purpose

While the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited understanding on the socio-political nature of institutional interactions that determine DI and affect organizational practices in social cash organizations. Drawing on the neo-institutionalist vision, the purpose of the study is to examine the unique set of institutional exchanges that influence the transition to digital social cash payments that give rise to new institutional arrangements in social cash organizations.

Design/methodology/approach

The paper draws on an in-depth case study of a government social cash organization in Pakistan. Qualitative data were collected using 30 semi-structured interviews from key organizational members and stakeholders.

Findings

The results suggest that DI is determined by the novel intersections between the coercive (techno-economic, regulatory), normative (socio-organizational), mimetic (international) and covert power (political) forces. Hence, DI is not a technologically deterministic output, but rather a complex socio-political process enacted through dialogue, negotiation and conflict between institutional actors. Technology is socially embedded through the process of institutionalization that is coupled by the deinstitutionalization of established organizational practices for progressive transformation.

Research limitations/implications

The research has implications for government social cash organizations especially in the Global South. Empirically, the authors gained rare access to, and support from a government-backed social cash organization in Pakistan (an understudied country in the Global South), which made the data and the consequent analyses even invaluable. This made the empirical contribution within this geographical setting even more worthy, since this case study has received little attention from indigenous scholars in the past. The empirical findings showcased a unique set of contextual factors that were subject to BISP and interpreted through an account of socio-cultural sensitivities.

Practical implications

The paper provides practical implications for policymakers and practitioners, emphasizing the need to address institutional challenges, including covert power, during the implementation of digitalization projects in the public sector. The paper has certain potential for inspiring future e-government related (or public sector focused) studies. The paper may guide both private and government policy-makers and practitioners in presenting how to overcome certain institutional challenges while planning and implementing large scale multi-stakeholder digitization projects in similar country contexts. So while there is scope of linking the digitization of public sector organizations to anti-corruption measures in other Global South countries, the paper may not be that straightforward with the private sector involvement.

Social implications

The paper offers rich social insights on the institutional interchanges that occur between the social actors for the innovation of technology. Especially, the paper highlights the social-embeddedness nature of technology that underpins the institutionalization of new organizational practices. These have implications on how DI is viewed as a socio-political process of change.

Originality/value

This study contributes to neo-institutional theory by theorizing covert power as a political force that complements the neo-institutional framework. This force is subtle but also resistive for some political actors as the force shifts the equilibrium of power between different institutional actors. Furthermore, the paper presents the social and practical implications that guide policymakers and practitioners by taking into consideration the unique institutional challenges, such as covert power, while implementing large scale digital projects in the social cash sector.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 3 December 2018

Paul Manning

The global financial crisis (GFC) has undermined the legitimacy of orthodox neo-classical economic assumptions, which nevertheless continue to frame the philosophical assumptions…

Abstract

Purpose

The global financial crisis (GFC) has undermined the legitimacy of orthodox neo-classical economic assumptions, which nevertheless continue to frame the philosophical assumptions of teaching in business schools. The purpose of this paper is to make a case in favour of an expansion of the business school curriculum to incorporate behavioural economics. The paper will also contend that behavioural economics can be connected to social economics, as they are both heterodox in this study and analyse economic phenomenon outside of a neo-classical framework. The aim is to contribute to arguments for an expanded curriculum, beyond the framing assumptions of neo-classical rationalism. This paper will also support its case by reviewing behavioural economics to make the case that this literature can be connected to social economics. This assertion is based on shared connections, including the importance of Kantianism in behavioural economics and in social economics. These connections will be discussed as a common point of reference points, or ties that can serve to broker links between these two economic paradigms. Practical implications (if applicable) the GFC presents an opportunity to re-shape the business school curriculum to acknowledge the centrality of socio-economics and behavioural economics, and consequently to offer an alternative to the dominant ontological assumptions – taken from the economic understanding of rationality – that have previously underpinned business school pedagogy.

Design/methodology/approach

The paper presents an inter-disciplinary teaching case, which incorporates socio-economic and behavioural economics perspectives. The teaching case concerned a socio-economic understanding of corruption and white-collar crime. It was also inter-disciplinary to include inputs from business history and criminology. The teaching case developed an appreciation among students that corruption, white-collar crime and entrepreneurship can be analysed within a social economics and behavioural economics lens.

Findings

The teaching case example discussed an alternative socio-economic and behavioural economics understanding to core areas of the MBA curriculum with the potential to be included in other academic disciplines. This enabled students to apply a behavioural economic approach to white-collar crime. The findings derived from this case study are that behavioural economics has the potential to enhance the teaching of socio-economics.

Originality/value

The originality of this paper is to apply behavioural economics to a socio-economic teaching case, in core subject areas of the MBA curriculum.

Details

International Journal of Social Economics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 2 January 2024

Muhammad Muflih, Muhamad Zen, Radia Purbayati, Kristianingsih Kristianingsih, Hennidah Karnawati, Bambang Iswanto and Endang Hatma Juniwati

This study evaluates the integrative role of justice theory, religiosity, satisfaction and trust in influencing customer loyalty to Islamic mobile banking.

Abstract

Purpose

This study evaluates the integrative role of justice theory, religiosity, satisfaction and trust in influencing customer loyalty to Islamic mobile banking.

Design/methodology/approach

This study surveyed 370 customers who used Islamic mobile banking. The authors employed SEM-PLS to estimate the proposed model and answer the hypotheses.

Findings

Empirical facts show that distributive justice, procedural justice and interactional justice can increase loyalty through the role of satisfaction. On the other hand, distributive justice, procedural justice and religiosity can predict loyalty through the role of trust.

Practical implications

This study encourages Islamic mobile banking providers to improve the quality of benefit distribution, the application of procedures and interaction among all levels of users. In addition, religious education innovation is also important to increase customer activity in using Islamic mobile banking.

Originality/value

Until now, none of the studies have estimated the loyalty of Islamic mobile banking users based on the integrative roles of justice theory, religiosity, satisfaction and trust. It, therefore, highlights the originality of this study.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 26 May 2023

Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…

Abstract

Purpose

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.

Design/methodology/approach

For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.

Findings

The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.

Originality/value

Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 8 December 2023

Oluwatoyin Esther Akinbowale, Polly Mashigo and Mulatu Fekadu Zerihun

The purpose of this study is to analyse cyberfraud in the South African banking industry using a multiple regression approach and develop a predictive model for the estimation and…

Abstract

Purpose

The purpose of this study is to analyse cyberfraud in the South African banking industry using a multiple regression approach and develop a predictive model for the estimation and prediction of financial losses due to cyberfraud.

Design/methodology/approach

To mitigate the occurrence of cyberfraud, this study uses the multiple regression approach to correlate the relationship between financial loss and cyberfraud activities. The cyberfraud activities in South Africa are classified into three, namely, digital banking application, online and mobile banking fraud. Secondary data that captures the rate of cyberfraud occurrences within these three major categories with their resulting financial losses were used for the multiple regression analysis that was carried out in the Statistical Package for Social Science (SPSS, 2022 environment).

Findings

The results obtained indicate that the South African financial institutions still incur significant financial losses due to cyberfraud perpetration. The two main independent variables used to estimate the magnitude of financial loss in the South Africa’s banking industry are online (internet) banking fraud (X2) and mobile banking fraud (X3). Furthermore, a multiple regression model equation was developed for the prediction of financial loss as a function of the two independent variables (X2 and X3).

Practical implications

This study adds to the literature on cyberfraud mitigation. The findings may promote the combat against cyberfraud in the South Africa’s financial institutions. It may also assist South Africa’s financial institutions to predict the financial loss that financial institutions can incur over time. It is recommended that South Africa’s financial institutions pay attention to these two key variables and mitigate any associated risks as they are crucial in determining their profitability.

Originality/value

Existing literature indicated significant financial losses to cyberfraud perpetration without establishing any relationship between the magnitude of losses incurred and the prevalent forms of cyberfraud. Thus, the novelty of this study lies in the analysis of cyberfraud in the South African banking industry using a multiple regression approach to link financial losses to the perpetration of the prevalent forms of cyberfraud. It also develops a predictive model for the estimation and projection of financial losses.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 30 October 2023

Suhans Bansal, Naval Garg and Jagvinder Singh

Cyberbullying has become one of the reasons behind the increase in psychological and medical problems. A need to prevent recurrences of cyberbullying incidents and discourage…

Abstract

Purpose

Cyberbullying has become one of the reasons behind the increase in psychological and medical problems. A need to prevent recurrences of cyberbullying incidents and discourage bullies from further bullying the victims has risen. This problem has attracted the attention of all stakeholders across the globe. Various researchers have developed theories and interventions to detect and stop bullying behavior. Previously, researchers focused on helping victims, but as the times have changed, so has the focus of researchers. This study aims to analyze scientific research articles and review papers to understand the development of the knowledge base on the topic.

Design/methodology/approach

This study analyzes the performance of literature on cyberbullying perpetration (CBP) using the widely accepted bibliometric analysis techniques: performance analysis and science mapping. The study is based on a dataset extracted from the Web of Science database. Initially, 2,792 articles between 2007 and 2022 were retrieved, which were filtered down to 441. The filter was based on various criteria, but primarily on CBP. VOSViewer and MS Excel were used to analyze the data. In addition, VOSViewer was used to create “bibliometric citations, co-citations, and co-word maps.”

Findings

The findings include publication and citation quantum and trends, the top 20 active countries, the most significant research articles and leading journals in this domain. Major themes or clusters identified were “Cyberbullying and victim behavior,” bullying behavior, adolescents and intervention, “cyberbullying associations,” and “cyberbullying personality associations.”

Originality/value

The study is unique because it analyses research articles based on cyberbullies, whereas past studies explored only the victims' side. Further, the present study used the Web of Science database, whereas most studies use the Scopus database.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of 17