Search results

1 – 10 of 40
Article
Publication date: 3 April 2024

Tim Wright, Zainab Ruhwanya and Jacques Ophoff

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a…

Abstract

Purpose

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a noteworthy surge due to the increased utilisation of cyberspace. The abrupt transition to telecommuting altered the interpersonal dynamics inherent in traditional work environments. This paper aims to examine the impact of interpersonal factors on the cybercrime preventative measures adopted by telecommuting employees.

Design/methodology/approach

A conceptual model, grounded in the Theory of Interpersonal Behaviour, is evaluated through an online survey. The data set comprises responses from 209 employees in South Africa, and the analysis uses partial least squares structural equation modelling.

Findings

The results reveal substantial predictive power to explain cybercrime preventative behaviours. Notably, the study underscores the significant influence of habit and affect on intention and subsequent behaviour.

Practical implications

The results suggest that practitioners should give due attention to emotional dimensions (affect) as a catalyst for information security behaviour. The formulation of employees’ information security responsibilities should be pragmatic, fostering subconscious compliance to establish routine behaviour (habit).

Originality/value

This research underscores the pivotal roles played by habit and emotions in shaping behavioural patterns related to information security. Furthermore, it provides researchers with an illustrative model for operationalising these constructs within the realm of security. The results contribute additional perspectives on the repercussions of the COVID-19 pandemic on cybercrime preventative behaviours.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 25 April 2024

Byrne Kaulu, Goodwell Kaulu and Pearson Chilongo

This study assesses the factors influencing customers’ intention to adopt e-banking in the context of the technology acceptance model and the moderation role of cybercrime.

Abstract

Purpose

This study assesses the factors influencing customers’ intention to adopt e-banking in the context of the technology acceptance model and the moderation role of cybercrime.

Design/methodology/approach

The variables in the study are measured using a five-point Likert scale with measures adopted from existing literature. The independent variables are perceived ease of use, perceived usefulness and security and privacy. These are postulated to be moderated by the perceived risk of cybercrime and to influence e-banking adoption intentions. A quantitative approach is used. Primary data are collected from a sample of 209 randomly selected bank customers. The study uses a two-step (measurement model and structural model) approach to data analysis.

Findings

The key findings in this study are that perceived risk of cybercrime strengthens the positive relationship between perceived ease of use and e-banking adoption intentions but dampens or weakens the positive relationship between perceived usefulness and customers’ e-banking adoption intentions. The study makes several recommendations to inform scholarship, policy and practice.

Originality/value

Unlike existing literature, the study makes a unique contribution by including perceived risk of cybercrime as a moderating variable of theoretical significance in the relationship between adoption of e-banking and its determinants.

Details

Journal of Money and Business, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-2596

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 9 April 2024

Iftikhar Ahmad, Salim Khan and Shahid Iqbal

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…

Abstract

Purpose

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.

Design/methodology/approach

In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.

Findings

The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.

Research limitations/implications

This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.

Practical implications

This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.

Social implications

This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.

Originality/value

This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7113

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Book part
Publication date: 25 March 2024

Sophia Beckett Velez

Abstract

Details

Compliance and Financial Crime Risk in Banks
Type: Book
ISBN: 978-1-83549-042-6

Article
Publication date: 23 February 2024

Junseon Jeong, Minji Park, Hyeonah Jo, Chunju Kim and Ji Hoon Song

This study identifies the policing pre-deployment training content for Korean experts based on needs assessments. Korean policing is at an excellent level to transfer knowledge…

Abstract

Purpose

This study identifies the policing pre-deployment training content for Korean experts based on needs assessments. Korean policing is at an excellent level to transfer knowledge and skills. Pre-deployment training should be designed systematically and training of trainers approaches should be implemented.

Design/methodology/approach

This study used T-tests, Borich needs assessments, and Locus for Focus model analyses to determine the priorities of needs for pre-deployment training in policing. A survey of 116 experienced experts was conducted, with 87 responding (75%).

Findings

The study identified 26 factors that deployed law enforcement professionals want to learn from pre-deployment training. These factors were categorized into three areas: research, training design and methods and understanding of partner countries and international development cooperation. The nine highest priorities for training needs were related to understanding the status and conditions of police training in the country to which policing experts are deployed.

Research limitations/implications

This study was limited to Korean policing experts. And the study did not evaluate the validity of the training curriculum or indicators.

Practical implications

Technical assistance in international policing development cooperation aims to train future trainers who can train local police. This study found that limited learner information and poor communication skills can lead to ineffective technical assistance.

Originality/value

This study highlights the importance of knowledge transfer and effective pre-deployment training for policing. The findings can be used to improve training programs and police human resource development.

Article
Publication date: 17 April 2024

Kabiru Kamalu and Wan Hakimah Binti Wan Ibrahim

This study examines the effect of digitalization on poverty and income inequality in developing countries. The study answers the question of whether digitalization is a way for…

Abstract

Purpose

This study examines the effect of digitalization on poverty and income inequality in developing countries. The study answers the question of whether digitalization is a way for developing countries to get out of poverty and income inequality.

Design/methodology/approach

The study uses data from 17 developing countries with data from 2005 to 2021. The study employs fully modified ordinary least squares (FMOLS) and dynamic ordinary least squares (DOLS), with an augmented mean group (AMG) for robustness. Digitalization, as the variable of interest, is proxied by the digitalization index (DI), constructed using principal component analysis (PCA). The dependent variables are poverty and income inequality, which are used in different models.

Findings

The evidence indicates that digitalization decreases poverty and income inequality in developing countries. These findings are justified when we use the AMG estimator, but the strength of the coefficients and significance levels are higher in the FMOLS and DOLS estimators. The results of the control variables also show that human development (LHDI), CO2 emissions and foreign direct investment (FDI) have decreasing effects on poverty and income inequality. Thus, digitalization is a good option for developing countries to get out of poverty and income inequality to achieve sustainable development goals (1&10).

Originality/value

This study provides rigorous empirical evidence on the effect of digitalization on poverty and income inequality in developing countries. Unlike the previous studies on developing countries, this study used a DI to proxy digitalization. In addition, the authors use FMOLS and DOLS estimators, with an AMG estimator for robustness, to provide long-run coefficients.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-08-2023-0586

Details

International Journal of Social Economics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0306-8293

Keywords

Abstract

Details

Compliance and Financial Crime Risk in Banks
Type: Book
ISBN: 978-1-83549-042-6

1 – 10 of 40