Search results
1 – 10 of 11Tareq Na’el Al-Tawil and Salam Abdallah
The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.
Abstract
Purpose
The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.
Design/methodology/approach
The analysis begins with a review of the nature of cyberbullying, focusing primarily on key concepts, underlying risk factors, forms of cyberbullying and adverse effects. Background information about the nature of cyberbullying will then lay the foundation for the subsequent sections of the analysis, which will focus on preventive strategies and legislative measures. The second section of the analysis will entail a review of the legislative framework for cyberbullying in the UAE. The goal here is to examine how the UAE is responding to the emerging threat of cyberbullying in its jurisdiction. The next section will then shift gears to interventions and strategies being implemented at the global level. A global perspective is central to comparing practices in the UAE to international standards and regulations.
Findings
Findings from the analysis have shown that the UAE has the most robust and comprehensive cyberbullying laws internationally. Nonetheless, the New Cybercrimes Law is ambiguous, and it is not expressively specific to cyberbullying. The law does not have a clear definition of cyberbullying, as well as the scope of its application to specific cases involving students. A comparative analysis across jurisdictions has revealed that most countries neither have specific cyberbullying laws nor explicitly define the phenomenon in existing laws. Thus, cyberbullying is a gray area in the UAE national law, requiring a clear definition and scope of application. The courts will establish case law that will finally address the current definitional challenges and extend of applying the New Cybercrimes Law.
Originality/value
The analysis concludes with the application of international best standards and practices to the UAE context, focusing specifically on how to strengthen laws and procedures in the UAE.
Details
Keywords
Atika Ahmad Kemal and Mahmood Hussain Shah
While the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited…
Abstract
Purpose
While the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited understanding on the socio-political nature of institutional interactions that determine DI and affect organizational practices in social cash organizations. Drawing on the neo-institutionalist vision, the purpose of the study is to examine the unique set of institutional exchanges that influence the transition to digital social cash payments that give rise to new institutional arrangements in social cash organizations.
Design/methodology/approach
The paper draws on an in-depth case study of a government social cash organization in Pakistan. Qualitative data were collected using 30 semi-structured interviews from key organizational members and stakeholders.
Findings
The results suggest that DI is determined by the novel intersections between the coercive (techno-economic, regulatory), normative (socio-organizational), mimetic (international) and covert power (political) forces. Hence, DI is not a technologically deterministic output, but rather a complex socio-political process enacted through dialogue, negotiation and conflict between institutional actors. Technology is socially embedded through the process of institutionalization that is coupled by the deinstitutionalization of established organizational practices for progressive transformation.
Research limitations/implications
The research has implications for government social cash organizations especially in the Global South. Empirically, the authors gained rare access to, and support from a government-backed social cash organization in Pakistan (an understudied country in the Global South), which made the data and the consequent analyses even invaluable. This made the empirical contribution within this geographical setting even more worthy, since this case study has received little attention from indigenous scholars in the past. The empirical findings showcased a unique set of contextual factors that were subject to BISP and interpreted through an account of socio-cultural sensitivities.
Practical implications
The paper provides practical implications for policymakers and practitioners, emphasizing the need to address institutional challenges, including covert power, during the implementation of digitalization projects in the public sector. The paper has certain potential for inspiring future e-government related (or public sector focused) studies. The paper may guide both private and government policy-makers and practitioners in presenting how to overcome certain institutional challenges while planning and implementing large scale multi-stakeholder digitization projects in similar country contexts. So while there is scope of linking the digitization of public sector organizations to anti-corruption measures in other Global South countries, the paper may not be that straightforward with the private sector involvement.
Social implications
The paper offers rich social insights on the institutional interchanges that occur between the social actors for the innovation of technology. Especially, the paper highlights the social-embeddedness nature of technology that underpins the institutionalization of new organizational practices. These have implications on how DI is viewed as a socio-political process of change.
Originality/value
This study contributes to neo-institutional theory by theorizing covert power as a political force that complements the neo-institutional framework. This force is subtle but also resistive for some political actors as the force shifts the equilibrium of power between different institutional actors. Furthermore, the paper presents the social and practical implications that guide policymakers and practitioners by taking into consideration the unique institutional challenges, such as covert power, while implementing large scale digital projects in the social cash sector.
Details
Keywords
Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…
Abstract
Purpose
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.
Design/methodology/approach
For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.
Findings
The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.
Originality/value
Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.
Details
Keywords
Oluwatoyin Esther Akinbowale, Polly Mashigo and Mulatu Fekadu Zerihun
The purpose of this study is to analyse cyberfraud in the South African banking industry using a multiple regression approach and develop a predictive model for the estimation and…
Abstract
Purpose
The purpose of this study is to analyse cyberfraud in the South African banking industry using a multiple regression approach and develop a predictive model for the estimation and prediction of financial losses due to cyberfraud.
Design/methodology/approach
To mitigate the occurrence of cyberfraud, this study uses the multiple regression approach to correlate the relationship between financial loss and cyberfraud activities. The cyberfraud activities in South Africa are classified into three, namely, digital banking application, online and mobile banking fraud. Secondary data that captures the rate of cyberfraud occurrences within these three major categories with their resulting financial losses were used for the multiple regression analysis that was carried out in the Statistical Package for Social Science (SPSS, 2022 environment).
Findings
The results obtained indicate that the South African financial institutions still incur significant financial losses due to cyberfraud perpetration. The two main independent variables used to estimate the magnitude of financial loss in the South Africa’s banking industry are online (internet) banking fraud (X2) and mobile banking fraud (X3). Furthermore, a multiple regression model equation was developed for the prediction of financial loss as a function of the two independent variables (X2 and X3).
Practical implications
This study adds to the literature on cyberfraud mitigation. The findings may promote the combat against cyberfraud in the South Africa’s financial institutions. It may also assist South Africa’s financial institutions to predict the financial loss that financial institutions can incur over time. It is recommended that South Africa’s financial institutions pay attention to these two key variables and mitigate any associated risks as they are crucial in determining their profitability.
Originality/value
Existing literature indicated significant financial losses to cyberfraud perpetration without establishing any relationship between the magnitude of losses incurred and the prevalent forms of cyberfraud. Thus, the novelty of this study lies in the analysis of cyberfraud in the South African banking industry using a multiple regression approach to link financial losses to the perpetration of the prevalent forms of cyberfraud. It also develops a predictive model for the estimation and projection of financial losses.
Details
Keywords
Suhans Bansal, Naval Garg and Jagvinder Singh
Cyberbullying has become one of the reasons behind the increase in psychological and medical problems. A need to prevent recurrences of cyberbullying incidents and discourage…
Abstract
Purpose
Cyberbullying has become one of the reasons behind the increase in psychological and medical problems. A need to prevent recurrences of cyberbullying incidents and discourage bullies from further bullying the victims has risen. This problem has attracted the attention of all stakeholders across the globe. Various researchers have developed theories and interventions to detect and stop bullying behavior. Previously, researchers focused on helping victims, but as the times have changed, so has the focus of researchers. This study aims to analyze scientific research articles and review papers to understand the development of the knowledge base on the topic.
Design/methodology/approach
This study analyzes the performance of literature on cyberbullying perpetration (CBP) using the widely accepted bibliometric analysis techniques: performance analysis and science mapping. The study is based on a dataset extracted from the Web of Science database. Initially, 2,792 articles between 2007 and 2022 were retrieved, which were filtered down to 441. The filter was based on various criteria, but primarily on CBP. VOSViewer and MS Excel were used to analyze the data. In addition, VOSViewer was used to create “bibliometric citations, co-citations, and co-word maps.”
Findings
The findings include publication and citation quantum and trends, the top 20 active countries, the most significant research articles and leading journals in this domain. Major themes or clusters identified were “Cyberbullying and victim behavior,” bullying behavior, adolescents and intervention, “cyberbullying associations,” and “cyberbullying personality associations.”
Originality/value
The study is unique because it analyses research articles based on cyberbullies, whereas past studies explored only the victims' side. Further, the present study used the Web of Science database, whereas most studies use the Scopus database.
Details
Keywords
The purpose of this paper is to analyse the metaverse platform in a social context to better understand the future of this tool in tourism cities and how this can help to improve…
Abstract
Purpose
The purpose of this paper is to analyse the metaverse platform in a social context to better understand the future of this tool in tourism cities and how this can help to improve the well-being of residents in both digital and physical scenarios.
Design/methodology/approach
In this paper, the current and probable developments in the metaverse, and its use in tourism cities and companies have been investigated. Moreover, this study develops, collects and examines the main metaverse definitions by expert authors and organizations as a methodology to ensure the transparency and credibility of the metaverse analysis.
Findings
Findings suggest that the fusion of the metaverse and tourism cities must create residents’ services and experiences in the new MetaTourPolis to help interact and connect citizens with the city’s institutions and companies, as well as make tourism cities more attractive, innovative, environmentally friendly and healthier places to live. Metaverse will bring new changes for residents and tourists, in fact, this virtual platform is already changing and improving the residents’ quality of life and people with disabilities in tourism cities. For instance, the metaverse platform has been implemented in Seoul, Santa Monica and Dubai MetaTourPolis to interact with their residents, including people with disabilities, to resolve bureaucratic and administrative problems, avoiding this group and the rest of the residents travelling by bus or car to the city’s institutions. In addition, several metaverse applications based on softbot tutors or metaverse virtual social centres have been developed to improve blind and impaired people, and elderly people’ quality of life, respectively.
Originality/value
A new concept called “MetaTourPolis” has been included to stage the relationship between tourism cities and the metaverse platform, where the fusion of metaverse and the new tourism polis of the 21st century will be at the service of citizens, tourists and companies, to create more sustainable, efficient, quantitative and environmental tourism cities.
Details
Keywords
Swagota Saikia, Alka Maurya and Manoj Kumar Verma
The emergence of cryptocurrencies has tremendously changed the way of financial transactions around the world which has led to form distinct discussions in the field regarding its…
Abstract
Purpose
The emergence of cryptocurrencies has tremendously changed the way of financial transactions around the world which has led to form distinct discussions in the field regarding its reliability. This paper aims to evaluate the published literatures on cryptocurrency identifying its growth, citation, prolific authors, journals, countries, active funding agencies, collaboration pattern and emerging research hotspots in the area.
Design/methodology/approach
Scientometrics and Altmetrics parameters have been incorporated in the study. Literatures covered from the Scopus database searching within “Article Title, Abstract, Keywords” with keywords “cryptocurrency” OR “digital currency” OR “bitcoin” OR “Ethereum” by limiting the time range of 2013–2022, English language and journal articles only. Total 6,107 documents have been identified. The further analysis and visualisation is performed using MSExcel, VOSviewer, Biblioshiny and Tableau. Another tool, Dimension.ai is used to identify the Altmetric Attention Score.
Findings
The findings reveal that the growth of research and citation rate hiked from the year 2017 till now. Elie Bouri is the top contributor, IEEE Access is the most prolific journal, China being the prolific country. Topics like Blockchain, Bitcoin, Ethereum, smart contracts, financial markets are emerging researched hotspots. The reliability of crypto market is still not clear because of its high volatility. The findings of the study will be more useful in the academia, subject specialists, research institutions, funding agencies, publishing agencies in decision-making.
Originality/value
To the best of the authors’ knowledge, there is no such study found considering both Scientometrics and Altmetrics approaches on cryptocurrency research with the selected time bound.
Details
Keywords
Natile Nonhlanhla Cele and Sheila Kwenda
The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…
Abstract
Purpose
The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.
Design/methodology/approach
Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.
Findings
A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.
Originality/value
With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.
Details
Keywords
Tanveer Kajla, Kirti Sood, Sanjay Gupta, Sahil Raj and Harpreet Singh
The objective of this research is to identify and prioritize the critical factors that influence the adoption of blockchain technology within the banking sector.
Abstract
Purpose
The objective of this research is to identify and prioritize the critical factors that influence the adoption of blockchain technology within the banking sector.
Design/methodology/approach
A well-known theoretical framework, the “Technology Organization Environment (TOE),” was chosen to analyze what criteria and sub-criteria affect blockchain adoption in the banking sector after a thorough assessment of the prior literature. Following that, 3 evaluation criteria and 14 sub-criteria were selected and verified using expert opinion. A survey design was created, and data for the study has been collected from various information technology (IT) managers/officers in the banking sector. A fuzzy analytic hierarchy process (Fuzzy-AHP) was then used to meet the purpose of the research.
Findings
The study identified that the organizational dimension is the most significant criteria for blockchain adoption in the banking sector, followed by the environmental dimension. In contrast, the technological dimension is the least influential criterion. Clientele pressure, IT resources, financial resources, pressure from competitors and relative advantage are the most influential sub-criteria for blockchain adoption.
Research limitations/implications
This study provides valuable insights to bank managers, blockchain and IT developers, third-party service providers and policymakers. For instance, adopting the same blockchain platform is easier for both large and small banks for banking operations by using third-party service provider. At the same time, banks should have the banks' own core team to implement the blockchain-based systems or to have control over the third-party service providers during the adoption stage.
Originality/value
To the best of the authors' knowledge, no empirical studies have used a holistic organizational context to understand the factors influencing the adoption of blockchain technology from traditional to blockchain-based banking systems.
Details
Keywords
Abdul Rahman Al Natour, Hamzah Al-Mawali, Hala Zaidan and Yasmeen Hany Zaky Said
This paper aims to investigate the role of forensic accounting skills in enhancing auditor’s self-efficacy towards fraud detection in Egypt. Additionally, it explores the…
Abstract
Purpose
This paper aims to investigate the role of forensic accounting skills in enhancing auditor’s self-efficacy towards fraud detection in Egypt. Additionally, it explores the moderating effect of computer-assisted audit techniques and tools (CAATTs) application on the relationship between accounting and auditing skills and auditor’s self-efficacy, as well as its role in enhancing fraud detection.
Design/methodology/approach
A cross-sectional survey was developed and distributed to 117 external auditors working in Egypt. Partial least square structural equation modelling is used to examine the study hypotheses.
Findings
The results show a significant direct relationship between effective communication skills, psycho-social skills, accounting and auditing skills and an auditor’s self-efficacy. Additionally, the results show a significant direct relationship between auditor’s self-efficacy and fraud detection. It is revealed that CAATTs application moderate the relationship between auditor’s self-efficacy and fraud detection. In contrast, the results do not show a significant relationship between technical and analytical skills and auditor’s self-efficacy.
Originality/value
The originality of this research paper lies in its exploration of the role of forensic accounting skills in enhancing auditor’s self-efficacy towards fraud detection in Egypt. It sheds light on the role of improved auditor’s self-efficacy in detecting fraud. Additionally, this study further enhances the understanding of the potential benefits of using technological advancements in the audit process. It provides insights for accounting professionals and regulatory bodies in Egypt, highlighting the importance of leveraging forensic accounting skills and using CAATTs to enhance fraud detection efforts.
Details