Search results

1 – 10 of 73
Article
Publication date: 10 July 2023

Jawahitha Sarabdeen

The Regulatory Technology (RegTech) is said to be the use of information technology for regulatory monitoring, reporting and compliance. It is used to solve regulatory and…

Abstract

Purpose

The Regulatory Technology (RegTech) is said to be the use of information technology for regulatory monitoring, reporting and compliance. It is used to solve regulatory and compliance issues more effectively and efficiently. Regulators with the digitization of regulation and datafication of processes would get empowered to manage volumes of data. RegTech would assist them in understanding innovative products, transactions, risks, reporting and any market manipulation activities in real time. For successful use of RegTech, the regulatory framework of a country should be comprehensive to address issues that may arise in the use of RegTech. Thus, the purpose of this article is to analyze the adequacy of the Saudi Arabian legal framework to address RegTech adoption.

Design/methodology/approach

The researcher using logical analysis method analyzed the available laws and interpreted the law to see the applicability and the adequacy of laws to regulate the use of RegTech in Saudi Arabia. The content analysis was also used in this research to analyze the literature. This analysis helped to explain the available literature on the research topic and its relevancy and the gap in literature.

Findings

The analysis using the logical and content methodologies shows that Saudi Arabia has general law to address some of the issues that might arise in the adoption of RegTech. Nonetheless, amending some of the existing laws or introducing guidelines could help better uplift of RegTech and similar technologies in Saudi Arabia.

Originality/value

As businesses and regulatory authorities embrace technology for better and efficient delivery of services and products in Saudi Arabia, the research is timely to analyze the adequacy of the laws in Saudi Arabia for adoption of RegTech. In the use of RegTech, issues related to privacy, due diligence, accountability and transparency could arise, however, there is a dearth of literature in these areas relating to technology adoption.

Details

International Journal of Law and Management, vol. 65 no. 6
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 13 November 2023

Tareq Na’el Al-Tawil and Salam Abdallah

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Abstract

Purpose

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Design/methodology/approach

The analysis begins with a review of the nature of cyberbullying, focusing primarily on key concepts, underlying risk factors, forms of cyberbullying and adverse effects. Background information about the nature of cyberbullying will then lay the foundation for the subsequent sections of the analysis, which will focus on preventive strategies and legislative measures. The second section of the analysis will entail a review of the legislative framework for cyberbullying in the UAE. The goal here is to examine how the UAE is responding to the emerging threat of cyberbullying in its jurisdiction. The next section will then shift gears to interventions and strategies being implemented at the global level. A global perspective is central to comparing practices in the UAE to international standards and regulations.

Findings

Findings from the analysis have shown that the UAE has the most robust and comprehensive cyberbullying laws internationally. Nonetheless, the New Cybercrimes Law is ambiguous, and it is not expressively specific to cyberbullying. The law does not have a clear definition of cyberbullying, as well as the scope of its application to specific cases involving students. A comparative analysis across jurisdictions has revealed that most countries neither have specific cyberbullying laws nor explicitly define the phenomenon in existing laws. Thus, cyberbullying is a gray area in the UAE national law, requiring a clear definition and scope of application. The courts will establish case law that will finally address the current definitional challenges and extend of applying the New Cybercrimes Law.

Originality/value

The analysis concludes with the application of international best standards and practices to the UAE context, focusing specifically on how to strengthen laws and procedures in the UAE.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 20 July 2023

Douglas Cumming, Sofia Johan and Robert Reardon

This paper aims to provide an in-depth examination of the emergent state of financial technology (fintech), particularly emphasizing capital-raising innovations and their…

1416

Abstract

Purpose

This paper aims to provide an in-depth examination of the emergent state of financial technology (fintech), particularly emphasizing capital-raising innovations and their implications for international business.

Design/methodology/approach

Using the highly influential articles published in fintech, the authors identify the advantages and disadvantages of each significant fintech in the credit, deposit and capital-raising services sector. The authors assess the adoption of these services and the international firm-level implications of their use.

Findings

This study highlights fintech’s role in fostering entrepreneurial internationalization, with a particular focus on the impact of crowdfunding, peer-to-peer lending and online banking. A thorough analysis of Google Scholar citations uncovers research gaps and unveils emerging trends bridging international business and fintech. Furthermore, the examination of regulatory efforts presents evidence of a robust positive relationship between global e-commerce legislation and fintech adoption, demonstrating the interconnected nature of these elements in the world of international business.

Research limitations/implications

Fintech research in international business has only taken off in the last five years. Innovations and regulatory developments are continuously evolving.

Originality/value

This study emphasizes the significance of fintech in international business research, addressing its implications on regulatory environments, entrepreneurial internationalization and multinational corporations’ global strategies. By investigating the synergies and applications of various fintech types, the research provides valuable insights for scholars and practitioners, contributing to the advancement of knowledge in the field of international finance.

Details

Multinational Business Review, vol. 31 no. 3
Type: Research Article
ISSN: 1525-383X

Keywords

Article
Publication date: 16 January 2024

Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…

Abstract

Purpose

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.

Design/methodology/approach

The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.

Findings

The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.

Research limitations/implications

This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.

Practical implications

Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.

Originality/value

The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.

Details

The Journal of Risk Finance, vol. 25 no. 2
Type: Research Article
ISSN: 1526-5943

Keywords

Article
Publication date: 7 March 2023

Miral Sabry AlAshry

The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press…

Abstract

Purpose

The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press freedom by using tools and techniques to communicate securely.

Design/methodology/approach

The study used focus group discussions with 14 journalists from Syria, Saudi Arabia, Libya, Yemen, Oman, Jordan and Egypt. While in Egypt, questionnaires were distributed to 199 journalists from both independent and semi-governmental outlets to investigate how Egyptian journalists interpret the new data protection law and its implications for press freedom.

Findings

The study indicated that journalists from these countries revealed severe censorship by their respective governments, an element inconsistent with the Arab Constitution. The recommendation of the study encourages media organisations to play a more active role in setting policies that make it easier for journalists to adopt and use digital security tools, while Egyptian journalists see the law as a barrier to media independence because it allows the government to exercise greater information control through digital policy and imposes regulatory rules on journalists.

Practical implications

The study identifies practical and theoretical issues in Arab legislation and may reveal practices of interest to scientists researching the balance between data protection, the right of access to information and media research as an example of contemporary government indirect or “soft” censorship methods.

Originality/value

To the best of the authors’ knowledge, this paper is one of the first research contributions to analyse the relationships between Arab authoritarians who used surveillance to restrict freedom of the press after the Arab Spring revolutions of 2011 to keep themselves in power as long as they could. In addition, Egypt's use of surveillance under new laws allowed the regimes to install software on the journalists’ phones that enabled them to read the files and emails and track their locations; accordingly, journalists can be targeted by the cyberattack and can be arrested.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 12 July 2022

Nur Mardhiyah Aziz and Nurshuhada Zainon

The synergy of lean construction and building information modelling (BIM) is an important change and transformation driver in the construction industry. It adds value and…

Abstract

Purpose

The synergy of lean construction and building information modelling (BIM) is an important change and transformation driver in the construction industry. It adds value and increases the productivity of construction processes. However, the implementation of lean-BIM in Malaysia is still lacking despite the accelerating BIM adoption rate. This study, therefore, aims to explore factors that potentially drive construction players to adopt lean-BIM for construction projects.

Design/methodology/approach

Exploratory interviews were conducted with five construction players knowledgeable in lean and BIM to identify the driving factors for them to implement lean-BIM. Respondents were obtained through the snowball sampling technique, initiated by approaching a government agency that oversees Malaysia's construction industry. Findings were then analysed using thematic analysis.

Findings

Findings have shown that four driving factors for construction players initiating the use of lean-BIM in construction projects are (1) top management support, (2) standardisation (3) comprehensive training and (4) financial support.

Research limitations/implications

Due to the exploratory nature of this study and the chosen research design, the conclusions cannot be generalised but can become the indicators for lean-BIM future works in Malaysia or any other developing countries.

Practical implications

The insights from this study provide preliminary indicators for driving the adoption of lean-BIM. This discovery may also help construction companies and policymakers plan appropriate initiatives or strategies to present the need for lean-BIM further development in Malaysia.

Originality/value

The findings are expected to contribute to the lean-BIM research in terms of the demographic context, particularly in Malaysia and possibly assist lean and BIM researchers, practitioners and policymakers in developing countries' perspective.

Details

Smart and Sustainable Built Environment, vol. 12 no. 4
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 11 October 2022

Kamakhya Narain Singh and Gaurav Misra

The purpose of this study is to identify the significant demographic and socio-economic characteristics of individuals who are likely to invest in a fraudulent investment scheme…

Abstract

Purpose

The purpose of this study is to identify the significant demographic and socio-economic characteristics of individuals who are likely to invest in a fraudulent investment scheme. It also quantifies the extent to which financial literacy helps in reducing the odds of investments in such schemes. Based on these findings, it provides policy recommendations to regulators and governments.

Design/methodology/approach

This study uses nationally representative data from the “India Assessment of Financial Capability 2018” survey. It further uses logistic regression with a binary outcome variable to assess the individual-level odds of investments in fraudulent investment schemes.

Findings

This study concludes that males between 40 and 59 years of age, who are well-educated (are at least graduates), score low in financial literacy, belong to the middle-income group, and SEC A3 households are most vulnerable to victimization by financial fraudulent investment schemes. It finds that financial literacy significantly reduces the odds of investment into fraudulent schemes to the extent of 39.118%.

Originality/value

This study quantifies the extent to which financial literacy helps in reducing the odds of individual investments in a fraudulent investment scheme. As financial literacy has a significant and negative relationship with the likelihood of investment in such schemes, this study provides policy interventions and recommendations to regulators and governments to safeguard the interest of individual investors.

Open Access
Article
Publication date: 22 December 2022

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun

This study aims to investigate the feasibility of employing a multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation. The…

Abstract

Purpose

This study aims to investigate the feasibility of employing a multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation. The formulated objectives are the minimisation of the total allocation cost of the anti-fraud capacities and the maximisation of the forensic accounting capacities in all cyberfraud incident prone spots.

Design/methodology/approach

From the literature survey conducted and primary qualitative data gathered from the 17 licenced banks in South Africa on fraud investigators, the suggested fraud investigators are the organisation’s finance department, the internal audit committee, the external risk manager, accountants and forensic accountants. These five human resource capacities were considered for the formulation of the multi-objectives integer programming (MOIP) model. The MOIP model is employed for the optimisation of the employed capacities for cyberfraud mitigation to ensure the effective allocation and utilisation of human resources. Thus, the MOIP model is validated by a genetic algorithm (GA) solver to obtain the Pareto-optimum solution without the violation of the identified constraints.

Findings

The formulated objective functions are optimised simultaneously. The Pareto front for the two objectives of the MOIP model comprises the set of optimal solutions, which are not dominated by any other feasible solution. These are the feasible choices, which indicate the suitability of the MOIP to achieve the set objectives.

Practical implications

The results obtained indicate the feasibility of simultaneously achieving the minimisation of the total allocation cost of the anti-fraud capacities, or the maximisation of the forensic accounting capacities in all cyberfraud incident prone spots – or the trade-off between them, if they cannot be reached simultaneously. This study recommends the use of an iterative MOIP framework for decision-makers which may aid decision-making with respect to the allocation and utilisation of human resources.

Originality/value

The originality of this work lies in the development of multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 25 March 2022

Shalini Nataraj-Hansen and Kelly Richards

Victims of online fraud face a high level of blame from their families, friends, professionals, the broader community and often from themselves. Victims are commonly perceived as…

Abstract

Purpose

Victims of online fraud face a high level of blame from their families, friends, professionals, the broader community and often from themselves. Victims are commonly perceived as stupid, gullible and undeserving of justice. The reasons for this are under-researched, and there are currently no satisfactory explanations of why victim-blaming occurs so frequently in cases of online fraud. This paper aims to propose a potential theoretical explanation for the high level of blame experienced by online fraud victims.

Design/methodology/approach

Lerner’s Belief in a Just World (BJW) theory is posited as a helpful theoretical explanation for the high level of blame directed towards victims of online fraud.

Findings

This paper argues that Lerner’s BJW theory is a helpful framework for understanding the blame faced by victims of online fraud because it posits that behavioural responsibility (a trait commonly ascribed to online fraud victims) is central to perceived blameworthiness; and that compensation for a crime determines the level of blame directed towards victims. As victims of online fraud are exceptionally unlikely to receive any type of compensation (whether monetary or otherwise), BJW may help explain the blame directed towards victims.

Originality/value

Prior scholarship predominantly understands the blame faced by online fraud victims through the lens of Nils Christie’s (1986) “ideal victim” thesis. This paper presents an advance over this existing understanding by illustrating how BJW provides a more detailed explanation for victim blame in online fraud.

Details

Journal of Financial Crime, vol. 30 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

1 – 10 of 73