Search results
1 – 10 of 10This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…
Abstract
Purpose
This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.
Design/methodology/approach
This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.
Findings
Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.
Originality/value
To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.
Details
Keywords
Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger and Erik S. Boyle
Cyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information…
Abstract
Purpose
Cyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information systems, carried out to coerce people or governments to further the social or political objectives of the attacker. Cyber terrorism is costly in terms of impaired operations and damaged assets. Cyber terrorism harms a firm’s reputation, thereby negatively affecting a firm’s stock market valuation. This poses grave worries to company management, financial analysts, creditors and investors. This study aims to evaluate the effect of cyber terrorism on the market value of publicly traded firms.
Design/methodology/approach
Financial information was obtained on business firms that were featured in news stories as targets of cyber terrorism. The firm’s stock price was recorded for 1, 3 and 7 days before and after the news article. Percentage changes in the firm’s stock price were compared to percentage changes in the Dow Jones Index to ascertain whether the firm’s stock price went up or down matching the market overall.
Findings
Results indicate that stock prices are significantly negatively affected by news of cyber terrorist attacks on companies. In all three time periods after the cyber terrorist attack, there was a significant negative decline in the stock value relative to the Dow Jones Index. Thus, the market valuation of the firm is damaged. As a result, the shareholders and institutions are financially damaged. Furthermore, exposed system vulnerability may lead to loss of business from consumers who have reduced confidence in the firm’s operations.
Practical implications
This paper examines the risks posed by cyber terrorism, including its impact on individual business firms, which in turn affect entire national economic systems. This makes clear the high value of cybersecurity in safeguarding computer systems. Taking steps to avoid being a victim of cyber terrorism is an important aspect of cybersecurity. Preventative steps are normally far less costly than rebuilding an information system after a cyber terrorist attack.
Originality/value
This study is original in examining the effect of cyber terrorism on the stock value of a company.
Details
Keywords
Doris Ngozi Morah and Oluchukwu Augustina Nwafor
The study investigates factors like media, tribal, religious and party politics' influence on Nigerias’ 2023 presidential election choice. It confirms dominant social media…
Abstract
Purpose
The study investigates factors like media, tribal, religious and party politics' influence on Nigerias’ 2023 presidential election choice. It confirms dominant social media platforms and examines their influence on election polls, e-participation and political candidate choice. The main objectives of this study are to: investigate if tribal, religious and party politics affect the respondent’s choice of a presidential candidate, ascertain the respondent's most used social media platform for political engagement and determine how social media platforms influenced the election polls during the 2023 Nigerian presidential election.
Design/methodology/approach
A sample size of 384 registered voters was used to survey three states in Southeast Nigeria hinged on the technological acceptance model, the instrumentalist theory of ethnicity and the theory of reasoned action.
Findings
The study found that tribal politics did not influence political candidates during the 2023 Nigerian presidential election. However, religious and party politics influenced their choices as well as X (Twitter), found as the most used and most influential social media platform vital for enhancing participatory democracy and informing people at real-time.
Research limitations/implications
The researchers experienced challenges such as ensuring that the respondents filled the questions appropriately to reduce the number of void questionnaires and a funding problem since they had yet to receive any grant to enhance the study.
Originality/value
The study commends improved Internet connectivity and accessibility among the citizens for increased political engagement on social media. It also recommends that the Nigerian government enforce the rule of law in politics to enable diverse tribes and religions to experience democratic e-participation and development without marginalisation or subjugation by incumbent power. The findings affirm that social media is apt in political communication during the 2023 presidential elections in Nigeria. The study is a contribution to knowledge, timely and original.
Details
Keywords
Łukasz Wiechetek and Arkadiusz Gola
This chapter describes the present state and the trends in the Polish information and communications technology (ICT) sector, which today is considered to be one of the most…
Abstract
Background
This chapter describes the present state and the trends in the Polish information and communications technology (ICT) sector, which today is considered to be one of the most progressively developing part of the national economy. Special attention is given to economic background, ICT employment and governmental policy. Some forecasts for future development were also proposed.
Purpose of the Chapter
The purpose of this chapter is to present the background, dynamics and future trends in the Polish ICT sector.
Methodology
The statistical data (Statistics Poland, Eurostat), market reports and scientific articles were analysed. Microsoft Excel and QGIS software was used to analyse the data and visualise the results.
Findings
Polish ICT market has stable fundaments, good infrastructure, qualified workers and a good location. Despite the developed infrastructure, e-commerce and e-administration usage is relatively low compared to the average level of EU27. The Polish ICT market specialises in software implementation, IT outsourcing and computer game development. The Polish ICT market development is associated with cloud computing, outsourcing, e-commerce, cybersecurity, big data, artificial intelligence (AI) and Industry 4.0. Poland is also in the top 10 countries for IT outsourcing worldwide, with the leading ICT centers in Warsaw, Cracow and Wrocław.
The growth of the ICT sector was (is) supported also by central programmes and government strategies: Operational Programme Digital Poland, Digital Competence Development Program and Cybersecurity Strategy. In the last 2 years, the development of ICT was also boosted by the COVID-19 pandemic. Market reports and forecasts show that the sector's future development will be related to artificial intelligence, Industry 4.0 and data analytics and financed by private business and central government contracts. The increase in remote work will also be significant.
Details
Keywords
Athina Karatzogianni, Jonathan Ong, Adi Kuntsman and Liu Xin
Le Thanh Ha, Thanh Trung To, Nguyen Thi Thanh Huyen, Ha Quynh Hoa and Tran Anh Ngoc
This study aims to analyze the effects of e-government on corruption prevalence by using a sample of 29 European countries over the period 2012–2019.
Abstract
Purpose
This study aims to analyze the effects of e-government on corruption prevalence by using a sample of 29 European countries over the period 2012–2019.
Design/methodology/approach
This paper uses the panel corrected standard errors (PCSE) model to mitigate the problems of cross-sectional dependence. The PCSE model is also considered to reexamine the findings when the presence of heteroscedasticity, fixed effects and endogeneity issues are taken into account. The theoretical model incorporates one-year-lagged explanatory variables to deal with endogeneity. The autoregressive distributed lag method using the dynamic fixed effects estimator is chosen to deal with the time and country-fixed effects in the effort to measure the short- and long-run effects of e-government more precisely.
Findings
The results indicate that e-government plays a critical role in improving the population’s perception of corruption. Furthermore, e-government appears to have an effect in the short run. Notably, the estimation results show that there is a nonlinear relationship between e-government, especially user centricity and key enablers and the corruption perception index in the U-shaped curve.
Practical implications
The short-run and nonlinear effects of e-government on corruption prevalence suggest that the fight against corruption requires countries to pursue a consistent and continuous improvement and development of the e-government system.
Originality/value
The authors contribute to the literature by providing a consistent and precise answer to this relationship in the case of European countries. Another contribution of the work is to use diverse indicators to reflect e-government in a typical country, which helps us confirm the reliability and robustness of the findings.
Details
Keywords
The purpose of this study is to exploration potential money laundering crimes with virtual currency facilities in Indonesia. Money laundering using crypto is the process of…
Abstract
Purpose
The purpose of this study is to exploration potential money laundering crimes with virtual currency facilities in Indonesia. Money laundering using crypto is the process of disguising the origin of money obtained illegally. Then, the perpetrator transfers it to a legitimate business. Virtual money then started to become a phenomenon in society since the emergence of cryptocurrencies as a form of technology development of e-commerce activities.
Design/methodology/approach
This research method is normative law which is prescriptive. The data collection technique used is document study or literature study by collecting primary and secondary legal materials.
Findings
The results of this study show that the bitcoin virtual currency has the potential to act as a means of money laundering. There are technologies and online platforms that are moving with more sophisticated methods. Through bitcoin exchanges, it has the greatest potential for money laundering. The usage of virtual currency (cryptocurrency) by those who commit money laundering offenses is responsible for the actions’ severe negative effects on the State of Indonesia.
Originality/value
To the best of the author’s knowledge, this is the first study conducted in Indonesia that explores potential money-laundering crimes using virtual currency facilities.
Details
Keywords
Babayo Sule, Usman Sambo and Muhammad Yusuf
This study aims to examine the threats posed by cybercrimes toward the quest for achieving a reliable digital economy and to identify practical strategies for countering the crime.
Abstract
Purpose
This study aims to examine the threats posed by cybercrimes toward the quest for achieving a reliable digital economy and to identify practical strategies for countering the crime.
Design/methodology/approach
A qualitative phenomenological paradigm was used as the methodology. Both primary and secondary sources were consulted for data collection. A thematic analytical interpretation was used for data analysis.
Findings
This study discovered that Nigeria is a leverage environment for using digital economy as a means of diversifying the economy owing to population bulge, and an increase patronage of internet and digital space but the threats of cyberfraudsters is ostracising a substantial number from using it which is decreasing the performance of the digital economy.
Research limitations/implications
The research is limited by the scarcity of resources to widen the horizon of the study particularly the fieldwork and the rampant incidences of cybercrime in Nigeria which poses a difficult task for studying the phenomenon. In addition, this study is constrained by the confidentiality in releasing data owing to the sensitivity of the subject of study and its relationship to national security.
Practical implications
This study presents some suggestions that are plausible in countering the crimes and enhancing the digital economy in Nigeria through effective surveillance, massive information and communication technology (ICT) awareness creation for users and severe penitent sanctions for cybercriminals will help in securing digital spaces.
Social implications
This study has social implications including the suggestion for simplifying digital transactions that will save time, increases economic activities and passive multiple stream income for Nigerians and ease of doing business with less risk of robbery and other cumbersome tasks.
Originality/value
This study has originality value because after the survey of the existing literature, a field work is conducted to have the views of experts on the subject of study which adds value to the subject and originality of the findings.
Details
Keywords
Afzal Izzaz Zahari, Jamaliah Said, Kamarulnizam Abdullah and Norazam Mohd Noor
This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in…
Abstract
Purpose
This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in Malaysia.
Design/methodology/approach
The study used an open-ended question and focus group methods to gather information from 20 Malaysian enforcement officers with extensive experience in dealing with terrorism-related activities, as they strive to prevent and counter terrorism incidents. In addition, experienced practitioners and field experts also contributed to the study.
Findings
The study reveals various innovative financial methods used by terrorist-linked organisations to evade detection by local enforcement agencies. These findings are consistent with previous research, which highlights the intelligence of these organisations in avoiding detection by financial regulators.
Research limitations/implications
The findings are based on the perspectives of enforcement officers involved in preventing and countering terrorism activities. Further research could be conducted to gather insights from other government agencies, such as the judiciary or local agencies.
Practical implications
The study offers practical suggestions for organisations and institutions on effectively monitoring and taking appropriate actions in financial activities related to terrorism.
Originality/value
This study provides unique insights into the financial methods of terrorism-related organisations in an emerging country in Southeast Asia. Its findings can be applied throughout the region, given the country’s global connectivity. Furthermore, the study is distinctive in that it provides information from enforcement officers within terrorism-related government organisations, an area where resources are limited. The study also considers the impact of the pandemic on the development of these financial innovations by terrorist organisations.
Details