Search results

1 – 10 of 10
Article
Publication date: 22 August 2023

Deymah Alweqyan

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…

Abstract

Purpose

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.

Design/methodology/approach

This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.

Findings

Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.

Originality/value

To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 2 February 2023

Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger and Erik S. Boyle

Cyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information…

Abstract

Purpose

Cyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information systems, carried out to coerce people or governments to further the social or political objectives of the attacker. Cyber terrorism is costly in terms of impaired operations and damaged assets. Cyber terrorism harms a firm’s reputation, thereby negatively affecting a firm’s stock market valuation. This poses grave worries to company management, financial analysts, creditors and investors. This study aims to evaluate the effect of cyber terrorism on the market value of publicly traded firms.

Design/methodology/approach

Financial information was obtained on business firms that were featured in news stories as targets of cyber terrorism. The firm’s stock price was recorded for 1, 3 and 7 days before and after the news article. Percentage changes in the firm’s stock price were compared to percentage changes in the Dow Jones Index to ascertain whether the firm’s stock price went up or down matching the market overall.

Findings

Results indicate that stock prices are significantly negatively affected by news of cyber terrorist attacks on companies. In all three time periods after the cyber terrorist attack, there was a significant negative decline in the stock value relative to the Dow Jones Index. Thus, the market valuation of the firm is damaged. As a result, the shareholders and institutions are financially damaged. Furthermore, exposed system vulnerability may lead to loss of business from consumers who have reduced confidence in the firm’s operations.

Practical implications

This paper examines the risks posed by cyber terrorism, including its impact on individual business firms, which in turn affect entire national economic systems. This makes clear the high value of cybersecurity in safeguarding computer systems. Taking steps to avoid being a victim of cyber terrorism is an important aspect of cybersecurity. Preventative steps are normally far less costly than rebuilding an information system after a cyber terrorist attack.

Originality/value

This study is original in examining the effect of cyber terrorism on the stock value of a company.

Details

Information & Computer Security, vol. 31 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 19 March 2024

Doris Ngozi Morah and Oluchukwu Augustina Nwafor

The study investigates factors like media, tribal, religious and party politics' influence on Nigerias’ 2023 presidential election choice. It confirms dominant social media…

Abstract

Purpose

The study investigates factors like media, tribal, religious and party politics' influence on Nigerias’ 2023 presidential election choice. It confirms dominant social media platforms and examines their influence on election polls, e-participation and political candidate choice. The main objectives of this study are to: investigate if tribal, religious and party politics affect the respondent’s choice of a presidential candidate, ascertain the respondent's most used social media platform for political engagement and determine how social media platforms influenced the election polls during the 2023 Nigerian presidential election.

Design/methodology/approach

A sample size of 384 registered voters was used to survey three states in Southeast Nigeria hinged on the technological acceptance model, the instrumentalist theory of ethnicity and the theory of reasoned action.

Findings

The study found that tribal politics did not influence political candidates during the 2023 Nigerian presidential election. However, religious and party politics influenced their choices as well as X (Twitter), found as the most used and most influential social media platform vital for enhancing participatory democracy and informing people at real-time.

Research limitations/implications

The researchers experienced challenges such as ensuring that the respondents filled the questions appropriately to reduce the number of void questionnaires and a funding problem since they had yet to receive any grant to enhance the study.

Originality/value

The study commends improved Internet connectivity and accessibility among the citizens for increased political engagement on social media. It also recommends that the Nigerian government enforce the rule of law in politics to enable diverse tribes and religions to experience democratic e-participation and development without marginalisation or subjugation by incumbent power. The findings affirm that social media is apt in political communication during the 2023 presidential elections in Nigeria. The study is a contribution to knowledge, timely and original.

Details

Journal of Innovative Digital Transformation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2976-9051

Keywords

Book part
Publication date: 9 November 2023

Łukasz Wiechetek and Arkadiusz Gola

This chapter describes the present state and the trends in the Polish information and communications technology (ICT) sector, which today is considered to be one of the most…

Abstract

Background

This chapter describes the present state and the trends in the Polish information and communications technology (ICT) sector, which today is considered to be one of the most progressively developing part of the national economy. Special attention is given to economic background, ICT employment and governmental policy. Some forecasts for future development were also proposed.

Purpose of the Chapter

The purpose of this chapter is to present the background, dynamics and future trends in the Polish ICT sector.

Methodology

The statistical data (Statistics Poland, Eurostat), market reports and scientific articles were analysed. Microsoft Excel and QGIS software was used to analyse the data and visualise the results.

Findings

Polish ICT market has stable fundaments, good infrastructure, qualified workers and a good location. Despite the developed infrastructure, e-commerce and e-administration usage is relatively low compared to the average level of EU27. The Polish ICT market specialises in software implementation, IT outsourcing and computer game development. The Polish ICT market development is associated with cloud computing, outsourcing, e-commerce, cybersecurity, big data, artificial intelligence (AI) and Industry 4.0. Poland is also in the top 10 countries for IT outsourcing worldwide, with the leading ICT centers in Warsaw, Cracow and Wrocław.

The growth of the ICT sector was (is) supported also by central programmes and government strategies: Operational Programme Digital Poland, Digital Competence Development Program and Cybersecurity Strategy. In the last 2 years, the development of ICT was also boosted by the COVID-19 pandemic. Market reports and forecasts show that the sector's future development will be related to artificial intelligence, Industry 4.0 and data analytics and financed by private business and central government contracts. The increase in remote work will also be significant.

Details

Modeling Economic Growth in Contemporary Poland
Type: Book
ISBN: 978-1-83753-655-9

Keywords

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Abstract

Details

Digital Politics, Digital Histories, Digital Futures
Type: Book
ISBN: 978-1-80382-201-3

Article
Publication date: 16 November 2023

Le Thanh Ha, Thanh Trung To, Nguyen Thi Thanh Huyen, Ha Quynh Hoa and Tran Anh Ngoc

This study aims to analyze the effects of e-government on corruption prevalence by using a sample of 29 European countries over the period 2012–2019.

Abstract

Purpose

This study aims to analyze the effects of e-government on corruption prevalence by using a sample of 29 European countries over the period 2012–2019.

Design/methodology/approach

This paper uses the panel corrected standard errors (PCSE) model to mitigate the problems of cross-sectional dependence. The PCSE model is also considered to reexamine the findings when the presence of heteroscedasticity, fixed effects and endogeneity issues are taken into account. The theoretical model incorporates one-year-lagged explanatory variables to deal with endogeneity. The autoregressive distributed lag method using the dynamic fixed effects estimator is chosen to deal with the time and country-fixed effects in the effort to measure the short- and long-run effects of e-government more precisely.

Findings

The results indicate that e-government plays a critical role in improving the population’s perception of corruption. Furthermore, e-government appears to have an effect in the short run. Notably, the estimation results show that there is a nonlinear relationship between e-government, especially user centricity and key enablers and the corruption perception index in the U-shaped curve.

Practical implications

The short-run and nonlinear effects of e-government on corruption prevalence suggest that the fight against corruption requires countries to pursue a consistent and continuous improvement and development of the e-government system.

Originality/value

The authors contribute to the literature by providing a consistent and precise answer to this relationship in the case of European countries. Another contribution of the work is to use diverse indicators to reflect e-government in a typical country, which helps us confirm the reliability and robustness of the findings.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 19 May 2023

Meiryani

The purpose of this study is to exploration potential money laundering crimes with virtual currency facilities in Indonesia. Money laundering using crypto is the process of…

Abstract

Purpose

The purpose of this study is to exploration potential money laundering crimes with virtual currency facilities in Indonesia. Money laundering using crypto is the process of disguising the origin of money obtained illegally. Then, the perpetrator transfers it to a legitimate business. Virtual money then started to become a phenomenon in society since the emergence of cryptocurrencies as a form of technology development of e-commerce activities.

Design/methodology/approach

This research method is normative law which is prescriptive. The data collection technique used is document study or literature study by collecting primary and secondary legal materials.

Findings

The results of this study show that the bitcoin virtual currency has the potential to act as a means of money laundering. There are technologies and online platforms that are moving with more sophisticated methods. Through bitcoin exchanges, it has the greatest potential for money laundering. The usage of virtual currency (cryptocurrency) by those who commit money laundering offenses is responsible for the actions’ severe negative effects on the State of Indonesia.

Originality/value

To the best of the author’s knowledge, this is the first study conducted in Indonesia that explores potential money-laundering crimes using virtual currency facilities.

Details

Journal of Money Laundering Control, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 28 October 2022

Babayo Sule, Usman Sambo and Muhammad Yusuf

This study aims to examine the threats posed by cybercrimes toward the quest for achieving a reliable digital economy and to identify practical strategies for countering the crime.

Abstract

Purpose

This study aims to examine the threats posed by cybercrimes toward the quest for achieving a reliable digital economy and to identify practical strategies for countering the crime.

Design/methodology/approach

A qualitative phenomenological paradigm was used as the methodology. Both primary and secondary sources were consulted for data collection. A thematic analytical interpretation was used for data analysis.

Findings

This study discovered that Nigeria is a leverage environment for using digital economy as a means of diversifying the economy owing to population bulge, and an increase patronage of internet and digital space but the threats of cyberfraudsters is ostracising a substantial number from using it which is decreasing the performance of the digital economy.

Research limitations/implications

The research is limited by the scarcity of resources to widen the horizon of the study particularly the fieldwork and the rampant incidences of cybercrime in Nigeria which poses a difficult task for studying the phenomenon. In addition, this study is constrained by the confidentiality in releasing data owing to the sensitivity of the subject of study and its relationship to national security.

Practical implications

This study presents some suggestions that are plausible in countering the crimes and enhancing the digital economy in Nigeria through effective surveillance, massive information and communication technology (ICT) awareness creation for users and severe penitent sanctions for cybercriminals will help in securing digital spaces.

Social implications

This study has social implications including the suggestion for simplifying digital transactions that will save time, increases economic activities and passive multiple stream income for Nigerians and ease of doing business with less risk of robbery and other cumbersome tasks.

Originality/value

This study has originality value because after the survey of the existing literature, a field work is conducted to have the views of experts on the subject of study which adds value to the subject and originality of the findings.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 21 November 2023

Afzal Izzaz Zahari, Jamaliah Said, Kamarulnizam Abdullah and Norazam Mohd Noor

This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in…

Abstract

Purpose

This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in Malaysia.

Design/methodology/approach

The study used an open-ended question and focus group methods to gather information from 20 Malaysian enforcement officers with extensive experience in dealing with terrorism-related activities, as they strive to prevent and counter terrorism incidents. In addition, experienced practitioners and field experts also contributed to the study.

Findings

The study reveals various innovative financial methods used by terrorist-linked organisations to evade detection by local enforcement agencies. These findings are consistent with previous research, which highlights the intelligence of these organisations in avoiding detection by financial regulators.

Research limitations/implications

The findings are based on the perspectives of enforcement officers involved in preventing and countering terrorism activities. Further research could be conducted to gather insights from other government agencies, such as the judiciary or local agencies.

Practical implications

The study offers practical suggestions for organisations and institutions on effectively monitoring and taking appropriate actions in financial activities related to terrorism.

Originality/value

This study provides unique insights into the financial methods of terrorism-related organisations in an emerging country in Southeast Asia. Its findings can be applied throughout the region, given the country’s global connectivity. Furthermore, the study is distinctive in that it provides information from enforcement officers within terrorism-related government organisations, an area where resources are limited. The study also considers the impact of the pandemic on the development of these financial innovations by terrorist organisations.

Details

Journal of Criminological Research, Policy and Practice, vol. 10 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

1 – 10 of 10