Search results

11 – 20 of over 1000
Article
Publication date: 18 October 2018

Katherine Taken Smith, Amie Jones, Leigh Johnson and Lawrence Murphy Smith

Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology…

2272

Abstract

Purpose

Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology management. Cybercrime often not only results in stolen assets and lost business but also damages a company’s reputation, which in turn may affect the company’s stock market value. This is a serious concern to company managers, financial analysts, investors and creditors. This paper aims to examine the impact of cybercrime on stock prices of a sample of publicly traded companies.

Design/methodology/approach

Financial data were gathered on companies that were reported in news stories as victims of cybercrime. The market price of the company’s stock was recorded for several days before the news report and several days after. The percentage change in the stock price was compared to the change in the Dow Jones Industrial average to determine whether the stock price increased or decreased along with the rest of the market.

Findings

Stock prices were negatively affected in all time periods examined, significantly so in one period.

Practical implications

This paper describes cases concerning cybercrime, thereby bringing attention to the value of cybersecurity in protecting computers, identity and transactions. Cyber security is necessary to avoid becoming a victim of cybercrime. Specific security improvements and preventive measures are provided within the paper. Preventive measures are generally less costly than repairs after a cybercrime.

Originality/value

This is an original manuscript that adds to the literature regarding cybercrime and preventive measures.

Details

Journal of Information, Communication and Ethics in Society, vol. 17 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 23 September 2019

Vanessa Ratten

Open innovation is important for technology firms as they can use freely available resources to source creative and innovative ideas. Despite the usefulness of open innovation for…

Abstract

Purpose

Open innovation is important for technology firms as they can use freely available resources to source creative and innovative ideas. Despite the usefulness of open innovation for technological advancements, few studies have focused on the role of cybercrime in affecting an organizations strategic direction. The purpose of this paper is to examine the effect of open innovation on cybercrime in technology firms.

Design/methodology/approach

Semi-structured in-depth interviews were conducted on technology firms to understand the role of open innovation in terms of technology scouting, horizontal collaboration and vertical collaboration on cybercrime activity.

Findings

The study found that there is a dilemma most technology firm’s face in having an open innovation strategy and how to manage cybercrime. This means that a coopetition strategy is utilized that helps to not only balance the need to have open innovation but also protect intellectual property.

Research limitations/implications

The study has implications for emerging technology innovations that not only need to have cyber security but also harness the use of Big Data.

Practical implications

Managers of technology firms need to encourage open innovation as a strategy but manage the cybercrime that comes from sharing too much information in an online context.

Originality/value

This paper is one of the first to link open innovation strategy to cybercrime activity in technology firms. Thus, it contributes to the literature on open innovation and cyber theft and security.

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 17 March 2020

James Popham, Mary McCluskey, Michael Ouellet and Owen Gallupe

Police-reported incidents of cybercrime appear to vary dramatically across Canadian municipal police services. This paper explores cybercrime reporting by police services in eight…

1200

Abstract

Purpose

Police-reported incidents of cybercrime appear to vary dramatically across Canadian municipal police services. This paper explores cybercrime reporting by police services in eight of Canada's largest municipalities, assessing (1) variation over time; (2) variation across jurisdictions; and (3) correlates of reporting volumes.

Design/methodology/approach

Data was collected from a combination of national Uniform Crime Report statistics and annual reports by police services. Two repeated one-way ANOVA tests and a Pearson's r correlation matrix were used to assess variation and correlation.

Findings

Findings suggest that police-reported cybercrime varies significantly across jurisdictions but not over time. Moreover, negative relationships were observed between police-reported cybercrime incidents per 100,000 residents and calls for service per 100,000, as well as number of sworn officers per 100,000.

Research limitations/implications

The study assessed a small sample of cities (= 8) providing 32 data points, which inhibited robust multivariate analyses. Data also strictly represents calls to police services, therefore excluding alternative resolutions such as public–private interventions.

Practical implications

Canadian provincial and federal governments should consider engaging in high-level talks to harmonize cybercrime reporting strategies within frontline policing. This will mitigate disparity and provide more accurate representations of cybercrime for future policy development. Additionally, services should revisit internal policies and procedures, as it appears that cybercrime is deprioritized in high call volume situations.

Originality/value

This paper introduces previously unreported data about police-reported cybercrime incidents in Canada. Furthermore, it adds quantitative evidence to support previous qualitative studies on police responses to cybercrime.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 29 May 2009

Sameer Hinduja and Joseph A. Schafer

The purpose of this paper is to quantify the number of cybercrime units that are on the world wide web and the manner in which they represent themselves, and to clarify how they…

1924

Abstract

Purpose

The purpose of this paper is to quantify the number of cybercrime units that are on the world wide web and the manner in which they represent themselves, and to clarify how they are communicating information to their constituency (i.e. the visitors to their site) through new technology.

Design/methodology/approach

There is no sampling frame that serves as an exhaustive list of law enforcement departments with web sites, nor law enforcement departments with computer crime units, nor law enforcement departments with cybercrime unit web sites. As such, the world wide web was combed using popular search engines to find as many US‐based cybercrime unit web sites as possible. The final sample size was 88.

Findings

The findings suggest that though cybercrime units across the USA typically have similar missions (e.g. to respond to one or more forms of computer crime), they used their self‐representing web site in different ways. Beyond providing basic contact information and details about the cybercrime unit, web sites varied considerably in the depth and nature of their content. Units largely utilized these sites to simply exist on the world wide web. It was also unclear whether the sites actually fostered two‐way communication between agencies and their constituents. Sites also placed an emphasis on providing information that visitors might use to reduce their vulnerability to victimization through educational efforts.

Research limitations/implications

The sites in the sample all sought to inform their constituencies about the existence of the cybercrime unit they represent and the services they render, and to provide basic contact information. They seemingly differed, though, in the main intent and purpose of their site – which introduced variability in terms of the delivery of their content. Furthermore, disparities in available resources likely dictated the quality and depth of information presented on these sites.

Practical implications

This work assesses the current state of law enforcement information delivery over the world wide web, and also informs best practices in quality, depth, and comprehensiveness of that information delivery. This can then be used by law enforcement departments who have a cybercrime unit web site to improve its current state and fine‐tune communications and information dissemination efforts.

Originality/value

This is the first assessment of the world wide web presences of US law enforcement cybercrime units and contributes to the knowledgebase associated with agency communication with external entities.

Details

Policing: An International Journal of Police Strategies & Management, vol. 32 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 4 September 2020

Seung Yeop Paek, Mahesh K. Nalla and Julak Lee

This exploratory research examined law enforcement officers' attitudes toward the public-private partnerships (PPPs) in policing cyberspace. Particularly, by investigating the…

Abstract

Purpose

This exploratory research examined law enforcement officers' attitudes toward the public-private partnerships (PPPs) in policing cyberspace. Particularly, by investigating the predictors of police officers' support for the PPPs, the authors aimed to offer practical implications for maintaining order and responding to illegal activities in the virtual environment.

Design/methodology/approach

A convenience sample of South Korean police officers was surveyed using a paper-and-pencil questionnaire.

Findings

The findings showed that officer perceptions of the seriousness and the frequency of property cybercrimes, computer proficiency and awareness of a lack of training were positively associated with the support for the PPPs. In addition, years of experience was negatively related to the support for the PPPs.

Originality/value

Law enforcement officers' perceptions toward public-private cooperation in combatting cybercrime have never been examined. This research fills the gap by exploring the predictors of officer support for cross-sectoral partnerships within the framework of nodal governance security in the cultural context of South Korea.

Details

Policing: An International Journal, vol. 43 no. 5
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 17 December 2019

George Burruss, Christian Jordan Howell, Adam Bossler and Thomas J. Holt

Cybercrime is the greatest threat facing law enforcement agencies in England and Wales. Although these crimes are transnational by nature, the burden of response has been placed…

Abstract

Purpose

Cybercrime is the greatest threat facing law enforcement agencies in England and Wales. Although these crimes are transnational by nature, the burden of response has been placed on line officers. Not all officers, however, believe they are capable of responding to calls involving cybercrime. The current study, using latent class analysis (LCA) on a large sample of English and Welsh officers, finds two types of officers: those prepared (39 percent) and those unprepared (61 percent). Using logistic regression to predict who falls into either classification, the authors find that training and age are the best predictors of latent membership. Implications for policy and future research are discussed. The paper aims to discuss these issues.

Design/methodology/approach

In this study, the authors used LCA to determine the number and character of unobserved categories of officers in how they deal with cybercrime.

Findings

The LCA indicated there are two distinct categories of police in the English and Welsh constabulary: those prepared (39 percent) and those unprepared (61 percent). Training and age were the two key determinants of this classification.

Research limitations/implications

LCA is an exploratory analysis technique that requires additional validation to confirm the findings of any one study.

Practical implications

The salience of training in helping officers feel prepared to deal with cybercrime cases as well as victims was demonstrated. A full 60 percent of the officers in this study fell in the “unprepared” category, which continues to highlight the limitations of local police to handle cybercrime cases; nevertheless, almost 40 percent of officer could be considered ready when responding to cybercrimes.

Social implications

As the harm cybercrime brings to our financial and social well-being, law enforcement agencies will be required to improve their response capabilities. Most current cybercrime responses address technical issues related to online fraud and abuse, but officers often perceive the problem as outside their legal and geographic jurisdiction. Knowing how officers perceive cybercrime as well as their own capabilities will allow us to begin changing enforcement policies, training capacity and individual response efficacy.

Originality/value

This study involved a sample of English and Welsh constables and sergeants to classify their cybercrime readiness. The analysis and particular data are unique to the study of cybercrime.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 2 March 2020

Steve van de Weijer, Rutger Leukfeldt and Sophie Van der Zee

Cybercrime rates have increased rapidly during the last couple of decades, resulting in cybercrimes becoming common crimes. However, most victims do not report cybercrimes to the…

2042

Abstract

Purpose

Cybercrime rates have increased rapidly during the last couple of decades, resulting in cybercrimes becoming common crimes. However, most victims do not report cybercrimes to the police. Therefore, this study examines reporting cybercrime victimization and provides insights into the role of the police in this process.

Design/methodology/approach

A sample of 595 individuals was used. All respondents were shown three vignettes about hypothetical cybercrime victimization and were asked to imagine that this situation happened to them. Four crime and reporting characteristics were manipulated across vignettes. Respondents' intentions to report to the police and to other organizations were used as the dependent variables in regression analyses. Four random factors in the vignettes (i.e. type of crime, seriousness of crime, victim–perpetrator relationship, and reporting modality), as well as several characteristics of the respondents were included in the regression models as independent variables.

Findings

The type of cybercrime is the most important predictor for reporting behaviors. Other determinants are: more serious offenses were more often reported and offenses are less often reported in situations where the victim personally knows the perpetrator. Furthermore, there is large discrepancy between intended and actual cybercrime reporting. These findings provide valuable insights into the factors that influence reporting behavior in the real world. Only a fifth of respondents indicated that they would not report cybercrime victimization to the police. This implies that attempts at improving reporting rates should not solely be focused on improving people's attitudes, but also on removing obstacles to turn these attitudes into actions.

Originality/value

In the current study, the authors contribute to the existing literature by asking a large sample from the general population in the Netherlands about both their intended reporting behavior (i.e. a vignette study) and their actual reporting behavior (i.e. self-reports) of victimization of a wide variety of different types of cybercrime. Determinants of both reporting to the police as well as to other organizations are examined. Moreover, respondents are asked about motivations behind their decision to (not) report a cybercrime to the police. Last, people were asked about their past experiences with reporting cybercrime victimization to the police.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 25 June 2020

Naci Akdemir and Christopher James Lawless

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes…

3814

Abstract

Purpose

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes victimisation and to test the applicability of lifestyle routine activities theory (LRAT) to cybercrime victimisation.

Design/methodology/approach

A mixed methods research paradigm was applied to address the research questions and aims. The data set of Crime Survey of England and Wales (CSEW) 2014/2015 and 42 semi-structured interviews conducted with victims of cybercrime and non-victim control group participants were analysed via binary logistic regression and content analyses methods.

Findings

This research illustrated that Internet users facilitated their victimisation through their online activities. Additionally, using insecure Internet connections and public access computers emerged as risk factors for both cyber-enabled and cyber-dependent crime victimisation. Voluntary and involuntary personal information disclosure through social networking sites and online advertisement websites increased the likelihood of being a target of phishing. Deviant online activities such as free streaming or peer-to-peer sharing emerged to increase the risk of cyber-dependent crime victimisation.

Research limitations/implications

The binary logistic regression analysis results suggested LRAT as a more suitable theoretical framework for cyber-dependent crime victimisation. Future research may test this result with models including more macro variables.

Practical implications

Policymakers may consider implementing regulations regarding limiting the type of information required to login to free Wi-Fi connections. Checking trust signs and green padlocks may be effective safeguarding measures to lessen the adverse impacts of impulsive buying.

Originality/value

This study empirically illustrated that, besides individual-level factors, macro-level factors such as electronic devices being utilised to access the Internet and data breaches of large companies also increased the likelihood of becoming the victim of cyber-enabled and cyber-dependent crime.

Details

Internet Research, vol. 30 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 13 April 2020

Norman Mugarura and Emma Ssali

The purpose of this paper is to decipher the law relating to cybercrimes regulation and benchmarking best practices that could be adopted to address regulatory weaknesses in some…

1010

Abstract

Purpose

The purpose of this paper is to decipher the law relating to cybercrimes regulation and benchmarking best practices that could be adopted to address regulatory weaknesses in some countries. In many countries, cybercrimes regulation is undermined by a lack of robust regulatory regimes. The few regimes that are available are fragmented with no coherent global strategy to deal with these offences across countries and regions. There is a lot of scholarly literature to corroborate the fact that lack of requisite laws on cyber and financial crimes has rendered states lame ducks when faced with well-organized and resourced criminal organizations.

Design/methodology/approach

This paper articulates intricacies of regulating money laundering and cybercrimes using data from selected African countries and beyond. Generic issues on financial crimes, cybercrimes, case law and policy documents drawn from different jurisdictions have been examined based on the objectives of the study. Cybercrime activities and anti-money laundering (AML) regulatory models have been evaluated drawing on experiences of selected countries in Africa and other countries. Questions whether suspicious activity reports are appropriate as a model to counter incidences of cybercrime activities or whether other options should be considered were also examined. Most notably, the risk-based assessment model such as profiling of high-risk clients rather than reporting every transaction will be compared and possibly suggested as a suitable alternative in financial crimes regulation. The authors have evaluated the data and AML regulatory approaches and other policy measures to curtail the foregoing threats. There is a possibility that AML tools used by financial institutions and banking activities could be used to prevent the growing threat of cybercrimes. The paper has also been enriched by case studies of tenuous legal systems and fragmentation of laws on cybercrimes and financial crimes and how these gaps have been exploited to fuel incidences of illicit criminal activities around the globe. The paper has also used empirical data including visits to banks and financial institutions on the nexus between the threat of cybercrimes and money laundering prevention. The authors have been selective, evaluating cases from 2000s to date. This timeline was particularly important because of the increased incidences of computers and money laundering threats globally. After analysing the data, the authors were able to delineate that there is a close connection between the foregoing two crimes, how they operate in practice, differences and similarities in the counter-measures used to mitigate their negative effect globally. Thus, in the authors’ contention, this is a novel study that is likely to spur farther research on law and policy against cyber and AML crimes not only in Uganda but also in other jurisdictions. At the same time, the findings of the study could complement, and perhaps also complete, the work of scholars who have written papers on cybercrimes to advocate for regulatory changes fight against these offences. The study will also complement the work of other researchers who have challenged the segregation of cybercrimes and financial crimes in local and international regulatory discourses. This research aims to make a significant contribution to the study of cybercrimes and how they are regulated in international law.

Findings

The findings of the paper have confirmed that the high incidences of money laundering and cybercrimes today are partly fuelled by inherent weaknesses in the global regulatory system and partly fuelled by weaknesses at an individual state level. Many countries have enacted a raft of anti-cyber and AML legislation but this notwithstanding, these laws have not been used to stem cross-border crimes globally. This is partly explained by the fact that many enforcement institutions lack the requisite capacity to institute measures through which to implement engendered laws and policies easily. The regulatory capacity of many countries has been eviscerated by deficiencies in infrastructure and systems.

Details

Journal of Money Laundering Control, vol. 24 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 7 January 2019

Muhammad Shoukat Malik and Urooj Islam

The purpose of this study is to gain more insight into the impact of cybercrime incidents in the banking sector of Pakistan. This study investigates the significant contribution…

2006

Abstract

Purpose

The purpose of this study is to gain more insight into the impact of cybercrime incidents in the banking sector of Pakistan. This study investigates the significant contribution of information security awareness on the relationship of cybercrimes and organizational performance.

Design/methodology/approach

The impact of cybercrime incidents on organizational performance is investigated by further exploring the moderating effects of information security awareness. A sample of 302 employees in the banking industry of Pakistan was studied by using survey design.

Findings

Cybercrime incidents have negative impact on organizational performance, but information security awareness weakens the negative impact of cybercrimes on organizational performance.

Research limitations/implications

The present study focuses on the banking sector so its finding cannot be generalized in other sectors. Further, in-depth comparative studies in other sectors with different cultural settings will help to authenticate the research findings.

Practical implications

Information security awareness weakens the negative impact of cybercrimes on organizational performance; therefore, it is important for banks’ HR managers to set up more security training courses to increase employees’ awareness on cybercrimes.

Originality/value

This study explores the impact of cybercrimes on banks’ performance with the moderating role of employees’ information security awareness. Linking these topics has created a new study within the cybercrimes discipline. The present study also enhances the understanding of employees’ role to combat the impact of cybercrimes on organizational performance.

Details

Journal of Financial Crime, vol. 26 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

11 – 20 of over 1000