Search results

1 – 10 of 443
Article
Publication date: 28 June 2023

Stephanie Garibaldi and Felicity Deane

The purpose of this paper is to demonstrate that the national security exception will not allow governments to respond to cyberspace threats within the confines of the world trade…

Abstract

Purpose

The purpose of this paper is to demonstrate that the national security exception will not allow governments to respond to cyberspace threats within the confines of the world trade organization (WTO) rules.

Design/methodology/approach

This paper is a desktop study of international trade laws with a specific focus on the convergence of cybersecurity measures and the national security exception provisions of the WTO.

Findings

The trends towards cybersecurity measures may mean there will inevitably be an evolution of trade norms. The question is, will the collective of the WTO be a part of the evolution, or merely an observer? In the authors’ view, it is crucial that it is the former.

Originality/value

This study makes three contributions. It provides a literature review and discussion on cybersecurity and the impact on trade. It demonstrates that the national security exception provision will not excuse these measures, and it aims to underscore the importance of the WTO as a community of nations where negotiation on important global issues is possible.

Details

Journal of International Trade Law and Policy, vol. 22 no. 2
Type: Research Article
ISSN: 1477-0024

Keywords

Article
Publication date: 18 September 2023

Miftachul Huda

In recent years, issues like untrusted or questionable sources of information are indisputably rampant in the digital era. The quality of information is now found to be…

Abstract

Purpose

In recent years, issues like untrusted or questionable sources of information are indisputably rampant in the digital era. The quality of information is now found to be challenging with its kind of issues, crisis and also clarity in which it requires to have a strategic scenario and practice to enhance quality assurance in order to creating safe cyber-spaces. The initiative to organise information at the organisational stage has widely emerged on the cyberspace. This paper aims to examine the insights of the element of trust in quality communication and information management to drive key performance indicator to support organisational sustainability. This approach is likely to play a significant role in enhancing critical inquiry in to issue of trust in information to ensure untainted integrity and quality assurance of the source of the information.

Design/methodology/approach

The preparation of this paper used a systematic literature review according to four phases, namely, identification, assessment or examination, extraction and interpretation. This approach was selected to advance critical inquiry into the most current topic on the trust for quality of information as way of strategic communication management to achieve safe cyber-organisational sustainability. The process was made through the various sources of peer-reviewed articles including journals, book chapters, books and conference proceedings. The literature review was carried out through the search for keywords such as trust in information, strategic communication and safe cyber-organisational sustainability.

Findings

The results revealed that the trust in quality of information with its wide range of initiatives could be enhanced as an initial attempt to embrace comprehensive approach in establishing strategic communication to ensure organisational sustainability and quality assurance of safe cyber space. The result further indicated three points, which follows development of virtual interaction with information management for safe cyberspace, enhancing continued predictability assessment in digital information process and practice and developing trust in information and quality of communication for organisational sustainability.

Research limitations/implications

This paper is expected to give an insightful value in contributing to quality measurement of the strategic communication to promote trust in quality of information. Hence, the design to expand strategic management to support digital social connections in the cyber space. As a result, the profound contribution would also lead to enhancement of organisational sustainability in the digital era, amid technological trends.

Practical implications

The need to develop an approach to strengthen the trust in information in the digital cyberspace should focus on providing insights into the quality of information, authenticity and integrity to develop quality assurance for social connection. The awareness raising process in consolidating the trust in information has to start with exploring early social interaction in the digital age. This approach provides quality assurance to linking digital connection to develop trust in the quality of information. This would enable feedback to ensure accessibility and accuracy of quality of information dealing with critical elements relating to organisational sustainability.

Originality/value

The entire awareness in expanding the trust as information quality indicator has to be started with exploring the early social interaction in the digital age, to achieve quality basis on linking the digital connection as an attempt to build the information quality. This would give a feedback in ensuring the accessibility and accuracy of information quality together with dealing with an ultimate element to lead to the organisational longevity.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 9 January 2023

Mohammed Al Shamsi, Deborah Smith and Kimberly Gleason

The purpose of this paper is to describe how non-fungible tokens (NFTs) can be used in the commission of financial crime, including money laundering and crypto-fraud schemes…

Abstract

Purpose

The purpose of this paper is to describe how non-fungible tokens (NFTs) can be used in the commission of financial crime, including money laundering and crypto-fraud schemes, using the framework of the Space Transition Theory.

Design/methodology/approach

A literature review relating the Space Transition Theory to crime vulnerabilities related to NFTs is conducted and practical examples illustrating NFT schemes are provided.

Findings

The authors find that the Space Transition Theory explains the evolution of financial crimes into the NFT space. The transformation of the art industry from the physical to the virtual space through NFTs underlies the criminal activity surrounding them. NFTs enable crime because of the flexibility, dissociative anonymity, lack of deterrence and anonymity.

Research limitations/implications

Criminals can easily take advantage of the users’ limited knowledge of blockchain to defraud them of their money or tokens. These risks accentuate the need to adopt appropriate measures to augment the accountability of NFT transactions. Until such interventions are implemented, the NFT market remains a highly viable space for the perpetration of financial crimes.

Practical implications

The dynamic nature of the cyberspace and fast-past underlying technology provide a greater chance to escape than crimes committed in the physical space. The state of security on NFT platforms has elicited concerns from diverse quotas. NFTs pose significant money laundering risks because of the lack of appropriate regulatory mechanisms, generating a need for enhanced oversight and enforcement of sectors of the economy in physical space vulnerable to abuse in the NFT space, including entities such as art galleries, museums, sports teams and luxury brands.

Social implications

The Space Transition Theory is also supported in that norms and values regarding ethics and criminal actions in the physical space do not transfer to cyber space.

Originality/value

The novelty aspect of this research is in applying the Space Transition Theory to financial crime schemes based on NFTs.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 14 December 2023

Durrey Shahwar and Rajib Lochan Dhar

The current digital work environment promoting a “constant-on” culture is a hotbed for cyber incivility. Thus, there is a pressing need to understand its mechanisms. This study…

Abstract

Purpose

The current digital work environment promoting a “constant-on” culture is a hotbed for cyber incivility. Thus, there is a pressing need to understand its mechanisms. This study aims to shed light on the triggers, sources and impact of rude behaviours in cyberspace. The authors also present the boundary conditions that exacerbate or alleviate the effects of such negative experiences.

Design/methodology/approach

Through a systematic literature review based on predefined search protocols, the authors synthesised the current knowledge on cyber incivility and identified 21 peer-reviewed research articles.

Findings

The findings reveal the different sources of cyber incivility, its personal, relational and organisational antecedents and consequences, and its personal and situational boundary conditions that curb or enhance the negative impact.

Research limitations/implications

The authors unravel the main future research avenues based on the review findings by systemising knowledge on cyber incivility. Managerial efforts in the form of interventions and mitigation are also discussed to help combat this grieving issue in the workplace.

Originality/value

This paper presents the first systematic review of the cyber incivility literature and identifies new avenues for future research. Scholars can expand upon the findings of this study to fill gaps and move the incivility in cyberspace forward. It also offers practical insights on mitigating the advancement of such behaviours in organisations.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

Book part
Publication date: 14 December 2023

Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…

Abstract

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.

In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.

In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.

Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.

Article
Publication date: 22 August 2023

Deymah Alweqyan

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…

Abstract

Purpose

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.

Design/methodology/approach

This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.

Findings

Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.

Originality/value

To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 28 October 2022

Babayo Sule, Usman Sambo and Muhammad Yusuf

This study aims to examine the threats posed by cybercrimes toward the quest for achieving a reliable digital economy and to identify practical strategies for countering the crime.

Abstract

Purpose

This study aims to examine the threats posed by cybercrimes toward the quest for achieving a reliable digital economy and to identify practical strategies for countering the crime.

Design/methodology/approach

A qualitative phenomenological paradigm was used as the methodology. Both primary and secondary sources were consulted for data collection. A thematic analytical interpretation was used for data analysis.

Findings

This study discovered that Nigeria is a leverage environment for using digital economy as a means of diversifying the economy owing to population bulge, and an increase patronage of internet and digital space but the threats of cyberfraudsters is ostracising a substantial number from using it which is decreasing the performance of the digital economy.

Research limitations/implications

The research is limited by the scarcity of resources to widen the horizon of the study particularly the fieldwork and the rampant incidences of cybercrime in Nigeria which poses a difficult task for studying the phenomenon. In addition, this study is constrained by the confidentiality in releasing data owing to the sensitivity of the subject of study and its relationship to national security.

Practical implications

This study presents some suggestions that are plausible in countering the crimes and enhancing the digital economy in Nigeria through effective surveillance, massive information and communication technology (ICT) awareness creation for users and severe penitent sanctions for cybercriminals will help in securing digital spaces.

Social implications

This study has social implications including the suggestion for simplifying digital transactions that will save time, increases economic activities and passive multiple stream income for Nigerians and ease of doing business with less risk of robbery and other cumbersome tasks.

Originality/value

This study has originality value because after the survey of the existing literature, a field work is conducted to have the views of experts on the subject of study which adds value to the subject and originality of the findings.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 16 February 2024

Leila Namdarian and Hamid Reza Khedmatgozar

This study aims to elucidate institutional analysis as an effective approach to investigating and designing the multilevel policymaking system of online social networks (OSN) for…

Abstract

Purpose

This study aims to elucidate institutional analysis as an effective approach to investigating and designing the multilevel policymaking system of online social networks (OSN) for achieving a participatory model.

Design/methodology/approach

The institutional mapping approach has been used to analyze Iran’s OSN multilevel policymaking system. A combination of two matrices, including institutions-institutions and institutions-functions, was used to perform the institutional mapping. Two main steps were taken to draw the mentioned matrices. First, a review of related studies in Iran’s OSN policymaking system was conducted and the policy functions mentioned in these studies were identified and categorized using the meta-synthesis. Second, based on analyzing two policy documents of Iran’s OSN, institutions and their interactions were identified and policy functions were allocated to institutions.

Findings

Based on the results, the most important policy functions in the current OSN policymaking system in Iran are support, regulatory, monitoring and evaluation, business environment development, culture building and promotion, organizing licenses and permissions, policymaking and legislation. Also, the results show that there are shortcomings in this system, some of the most important of which are lack of transparency in regulatory, little work in culture building and promotion, neglect of the training of specialized human resources and research and development, slow development of the business environment and neglecting the role of nongovernmental organizations in policymaking.

Originality/value

By examining and analyzing how different institutions operate within a multilevel policymaking system, the policymaking process and its overall effectiveness can be enhanced. This analysis helps identify any inconsistencies, overlaps or conflicts in the roles and policies of these institutions, leading to a better understanding of how a multilevel policymaking system is organized.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 13 June 2023

Adam Lovasz

Drawing on the work of Niklas Luhmann, the paper argues that technology can be viewed as a self-referential system which is autonomous from both human beings and other function…

Abstract

Purpose

Drawing on the work of Niklas Luhmann, the paper argues that technology can be viewed as a self-referential system which is autonomous from both human beings and other function systems of society. The paper aims to develop a philosophy of technology from the work of Niklas Luhmann. To achieve this aim, it draws upon the systems-theory work of Jacques Ellul, a philosopher of technology who focuses on the autonomous potential of technological evolution.

Design/methodology/approach

The paper draws on the work of Niklas Luhmann and Jacques Ellul to explore the theme of autonomous technology and what this means for our thinking about technological issues in the twenty-first century. Insights from these two thinkers and researchers working in the Luhmannian sociological tradition are applied to remote work.

Findings

The sociological approach of Luhmann, coupled with Ellul's insights into the autonomous nature of technology, can help us develop a systems theory of technology which takes seriously its irreducibility to human functions.

Research limitations/implications

The paper contributes to the growing sociological literature that thematizes the Luhmannian approach to technology, helping us better understand this phenomenon and think in new ways about what technological autonomy means.

Originality/value

The paper brings together the work of Luhmann, Ellul and contemporary researchers to advance a new understanding of technology and technological communication.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 12 January 2023

Fahmi Ali Hudaefi, M. Kabir Hassan and Muhamad Abduh

This study aims at two objectives, i.e. first, to identify the core elements of the Islamic fintech ecosystem, and second, to use the identified core elements to analyse the…

Abstract

Purpose

This study aims at two objectives, i.e. first, to identify the core elements of the Islamic fintech ecosystem, and second, to use the identified core elements to analyse the development of such an ecosystem in Indonesia.

Design/methodology/approach

This work combines data analytics of text mining with qualitative analysis of human intelligence in two steps. First, knowledge discovery of the Islamic fintech ecosystem’s core elements using a sample of eight academic articles totalling 102 pages and 75,082 words. Second, using the identified core elements from step one to explore such ecosystem development in Indonesia. This stage employs a sample of 11 documents totalling 371 pages and 143,032 words from cyberspace.

Findings

The core elements of the Islamic fintech ecosystem identified are financial customers, fintech startups, government, technology developers, traditional financial institutions and fatwa (Islamic legal opinion). Furthermore, the development of the Islamic fintech ecosystem in Indonesia is examined under these identified core elements, providing critical insights into the Islamic fintech ecosystem currently established in the country's industry.

Research limitations/implications

This study primarily used semi-structured data from cyberspace. Traditional approaches to qualitative data collection, e.g. focused group discussions and interviews, may be beneficial for future studies in addressing the Islamic fintech ecosystem issues.

Practical implications

Academia worldwide may benefit from this work in incorporating knowledge of Islamic fintech ecosystem’s core elements into Islamic finance literature. Specifically, fintech stakeholders in Indonesia may be advantaged to understand how far the Islamic fintech ecosystem has grown in the country.

Social implications

The rise of unethical fintech peer-to-peer lending shows social problems in Indonesia’s fintech industry. The finding derives social implications that elucidate the current state of the country’s Islamic fintech ecosystem.

Originality/value

Using a kind of big data (i.e. semi-structured text data) from cyberspace and applying steps of text mining combined with qualitative analysis, may contribute to the creation of novelties for qualitative research on financial issues.

Details

Qualitative Research in Financial Markets, vol. 15 no. 3
Type: Research Article
ISSN: 1755-4179

Keywords

1 – 10 of 443