Search results

1 – 10 of 399
Article
Publication date: 7 November 2016

Jing Li and Philip Pearce

The purpose of this paper is to identify dominant scams against domestic tourists in popular tourism cities in China. There are two questions of concern: what types of scams do…

2124

Abstract

Purpose

The purpose of this paper is to identify dominant scams against domestic tourists in popular tourism cities in China. There are two questions of concern: what types of scams do domestic tourists experience and are the patterns of scams different between the capital and regional cities? The social situation framework was employed to interpret the outcomes.

Design/methodology/approach

A content analysis facilitated by Leximancer software was applied to 102 Chinese travel blogs reporting experiences of being scammed in Beijing, Hangzhou, Xi’an, Sanya and Guilin. Clear themes and concepts emerged from the analysis of these travel reviews and differences in scamming patterns between Beijing and regional cities were identified.

Findings

The most frequently reported scams in the capital Beijing were linked to the chaotic environment at tourist attractions and the misbehaviours of tour agents. By way of contrast scams involving manipulating the weight and quality of products purchased were more common in regional cities. The differences between Beijing and other locations may lie in the greater monitoring of fraudulent practices in the capital. Additionally, the role of shills (confederates of the scammer) was highlighted in many of the scams studied.

Originality/value

Scams include a slightly less serious but still troublesome set of problems accompanying major crimes and assaults. Rare research specifically focussed on tourist scams despite substantive work discussing crimes against tourists as general. Implications of the present study lie in enriching the literature on scams against tourists. The analysis of scams as a special type of social situation proved to be insightful in directing attention to facets of the interaction thus providing connections to previous work and directions for further study. It is also promising to be developed to inform strategic approaches to creating a safer tourism environment in cities.

Details

International Journal of Tourism Cities, vol. 2 no. 4
Type: Research Article
ISSN: 2056-5607

Keywords

Article
Publication date: 17 August 2015

Daniel Sersland and Rajan Nataraajan

The purpose of this paper is to investigate and contribute to the understanding of the critical issue of “driver turnover” in the USA long-haul trucking environment which is…

1092

Abstract

Purpose

The purpose of this paper is to investigate and contribute to the understanding of the critical issue of “driver turnover” in the USA long-haul trucking environment which is becoming a malaise in the transportation sector not only in the USA but also worldwide. Most importantly, it accomplishes this through an exploration of the perceptions of the “drivers” themselves regarding the external customer-base in the trucking industry. This, to the best knowledge of the authors, has not yet been done and so becomes the missing angle in focus on driver turnover research.

Design/methodology/approach

This exploratory study employs a qualitative research methodology via in-depth interviews of a select sample of drivers in a field setting followed by content analysis of the responses. This methodology, by and large, is the most suitable for this type of exploration.

Findings

A content analysis of the perceptions of drivers reveals several important reasons (or causes) for driver turnover. This paper elaborates on those and offers customer-centric solutions to alleviate the plight of the driver and improve overall performance in the trucking sector.

Research limitations/implications

Needless to say, this exploratory research should be replicated in several other locations within the USA, other settings (e.g. trucking in extreme conditions), and other countries in order to enhance the external validity of the findings and recommendations.

Practical implications

All implications of this research are practical as they have direct managerial significance.

Originality/value

The value of this research lies in the fact that, to the best knowledge of the authors, this is the first study that explores the perceptions of long-haul drivers regarding the external customer-base of the trucking industry. The findings have direct implications for management in the trucking sector.

Details

Journal of Service Management, vol. 26 no. 4
Type: Research Article
ISSN: 1757-5818

Keywords

Open Access
Article
Publication date: 13 November 2018

Wenjun Jing and Baowen Sun

This paper aims to clarify the complex path of negative externalities in the sharing economy and proposes corresponding policy recommendations.

8251

Abstract

Purpose

This paper aims to clarify the complex path of negative externalities in the sharing economy and proposes corresponding policy recommendations.

Design/methodology/approach

This paper aims to establish an analytical framework for the negative externalities of the sharing economy and to extract the main factors that produce negative externalities, and then, through qualitative comparative analysis method find out how these factors interact to form a negative externality.

Findings

Negative externalities in the sharing economy come from the joint effect of the sharing degree of the product or service and constraint mechanism, and the current main modes of the shared economy increase the possibility of negative externalities.

Originality/value

The paper proposes a complex path resulting from negative externalities in the shared economy.

Details

International Journal of Crowd Science, vol. 2 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Article
Publication date: 7 October 2013

Bistra Nikiforova and Deborah W. Gregory

This paper aims to analyze Nigerian Letter scam emails in the context of processes of globalization in order to understand how and why they continue to defraud people despite the…

1269

Abstract

Purpose

This paper aims to analyze Nigerian Letter scam emails in the context of processes of globalization in order to understand how and why they continue to defraud people despite the increased public awareness.

Design/methodology/approach

This paper analyses over 500 emails received in an institutional email box over a nine-year period. Distinct rhetorical strategies for conveying trust and reputation were identified as indicators of the global connectedness of scammers and their victims.

Findings

Scammers from Third World countries and their First World victims share similar perceptions of trust and business reputation due to the global financial flows and transnational movement of people and labour, which is strengthened by the internet. They have transformed the rhetorical elements that establish trust and reputation within the Western rational context and imbued them with new value meanings intended to defraud their victims.

Originality/value

This paper is the first to interpret the success of Nigerian Letter scams as a product of processes that go beyond scammers' and their victims' social and political realities. It is valuable for crime-fighting organizations because it accounts not only for the rhetorical strategies used by the scammers but also for the underlying context that enables the spread and success of the online Confidence Letter scams.

Details

Journal of Financial Crime, vol. 20 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 7 January 2019

Maree Thyne, Kirsten Robertson, Leah Watkins and Olly Casey

Children are familiar with retail outlets (especially supermarkets) and the reality of shopping from an increasingly early age. In turn, retailers are actively engaging this young…

1086

Abstract

Purpose

Children are familiar with retail outlets (especially supermarkets) and the reality of shopping from an increasingly early age. In turn, retailers are actively engaging this young market, targeting them through various promotional strategies. One popular strategy adopted by grocery retailers is giveaway collectible set items. The purpose of this paper is to question the ethicality of such campaigns, within the framework of vulnerable consumers by examining children’s opinions of the campaigns and the supermarkets who run them, and the drivers of children’s involvement in the campaigns.

Design/methodology/approach

Qualitative focus groups were employed with 67 children aged five to ten years. Focus groups were made up of children in similar age groups to cluster responses by age and allow for comparisons. Thematic analysis was undertaken and responses were coded into themes.

Findings

Children were initially driven to collect through promotional advertising or because a third party offered them a collectible. The drivers for subsequent collecting differed between age groups, with younger children more focussed on themes around play and older children (seven and above) collecting through habit, because it was a craze amongst their peers and therefore the collections became items of social currency. Children’s perceptions of the supermarkets motivations also differed by age. Younger children thought supermarkets gave the collectibles away as “gifts” for altruistic reasons. The older children articulated a clear understanding of the economic motives of the organisation including: to attract children to their stores, to encourage pester power and to increase revenue by encouraging customers to buy more. The older children questioned the ethics of the collectible campaigns, referring to them as scams.

Research limitations/implications

The findings extend the important discussion on the nature of children’s vulnerability to advertising by showing that the children’s vulnerability stretches beyond their ability to understand advertising intent. Despite older children in the present study being cognisant of retailers’ intentions they were still vulnerable to the scheme; the embeddedness of the scheme in the social lives of the children meant they lacked agency to opt out of it. Further, the finding that the scheme transcended boundaries in the children’s lives, for instance, being associated with social currency at school, highlights the potential negative impact such schemes can have on the well-being of children.

Originality/value

Until now, research has investigated the motivations that children have to collect, but previous studies have focussed on collections which have been determined by the children. This paper presents the opinions and perceptions of the children who are directly targeted by commercial organisations to collect and raises concerns around the ethicality of such schemes.

Details

International Journal of Retail & Distribution Management, vol. 47 no. 6
Type: Research Article
ISSN: 0959-0552

Keywords

Article
Publication date: 21 October 2021

Tuan Phong Ly, Kim Quang Yi and Hilda Hio Fong Fok

In Vietnam, there is a phenomenon that domestic tourists return to some tourist destinations despite their reputation of tourists being scammed. This study aims to focusses on…

296

Abstract

Purpose

In Vietnam, there is a phenomenon that domestic tourists return to some tourist destinations despite their reputation of tourists being scammed. This study aims to focusses on Vung Tau City in Vietnam as a popular seaside destination to explain this interesting phenomenon.

Design/methodology/approach

Thereby, 22 domestic tourists who are repeated visitors and had experienced scams directly and/or indirectly in Vung Tau were interviewed and later took part in a self-evaluation.

Findings

The data shows that unreasonable charges, switching products, false reporting and dishonest middle-persons are the major dominant scams in the city. Furthermore, all visitors could be scammed regardless of gender, educational background or age. Even though scams may occur, the city remains to be a popular getaway destination for the Southern part of Vietnam due to its irreplaceable natural resources and visit intention of domestic tourists. The local authority has tried different ways to suppress issues related to tourist scams, however, due to their sociocultural and economic conditions, scams find ways to exist. Under this circumstance, domestic tourists tend to figure out how to handle scams by themselves whilst very few of them rely on the public sector to deal with them.

Practical implications

Finally, some practical strategies and recommendations are given as a reference for the local authority and businesses for long-term tourist business development.

Originality/value

This paper, respectively, investigates the common scams against domestic tourists in Vung Tau, reasons they still return to this destination, and finally, how these visitors attempt to avoid scams.

Details

International Journal of Tourism Cities, vol. 8 no. 1
Type: Research Article
ISSN: 2056-5607

Keywords

Article
Publication date: 15 May 2020

Irfan Ullah, Wiqar Ahmad and Arshad Ali

This paper aims to identify the key patronage factors that encouraged the public for investment in the Modaraba scam – a Ponzi scheme perpetrated in Pakistan with a whim of…

Abstract

Purpose

This paper aims to identify the key patronage factors that encouraged the public for investment in the Modaraba scam – a Ponzi scheme perpetrated in Pakistan with a whim of Sharīʿah-compliant business and intermediation of religious clerics.

Design/methodology/approach

In a qualitative research, semi-structured interviews were conducted with the investors of the scam followed by thematic analysis to conclude on the subject matter.

Findings

The results reveal numerous stimuli, thematically categorized as the monetary stimulus, religiosity stimulus and lubricants, which mobilized investment towards the scam. In general, a lucrative rate of return on investment and personality of the agents, being religious clerics, were the two prominent reasons, which convinced unanimously all investors. In particular, the religiosity stimulus (agents’ personality and Sharīʿah-compliant business) was a novel and eye-catching slogan of the scheme.

Originality/value

Keeping in view the amount of scam and number of victims, this research is a robust attempt to conclude on the determinants of investment decision in the Modaraba scam.

Details

Journal of Financial Crime, vol. 29 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 6 June 2022

Jianan Ma, Fangxuan (Sam) Li and Yuanyuan Shang

Drawing upon affective events theory (AET), this study aims to explore the relationship between tourists’ perceived deception and moral emotions, dissatisfaction, revisit…

Abstract

Purpose

Drawing upon affective events theory (AET), this study aims to explore the relationship between tourists’ perceived deception and moral emotions, dissatisfaction, revisit intention and negative word of mouth.

Design/methodology/approach

Online data from Questionnaire Star were used to examine the proposed research model. A total of 437 valid questionnaires were collected.

Findings

The results suggest that tourist scams as “affective events” could trigger tourists’ moral emotions and dissatisfaction, thereby decreasing their revisit intention and generating negative word of mouth. Additionally, moral emotions were found to act as a mediator between perceived deception and dissatisfaction.

Research limitations/implications

The insights uncovered in this study reveal the mechanisms behind tourists’ reactions to scams and provide implications for tourism destinations, suggesting ways to alleviate the adverse impact of tourist scams.

Originality/value

To the best of the authors’ knowledge, this is the very first study to investigate tourists’ reactions to tourist scams.

旅游欺诈, 道德情感和游后行为:对道德情感, 不满, 重游意向和负面口碑的影响

目的

研究基于情感事件理论 (AET), 旨在探究游客的感知欺骗与道德情绪、不满、重游意向和负面口碑之间的关系。

设计/方法

通过问卷星收集的线上数据对研究模型进行了检验。共回收有效问卷437份。

发现

本研究的结果表明, 作为“情感事件”的旅游欺诈可能会引发游客的道德情绪和不满, 从而降低他们的重游意向, 并产生负面口碑。此外, 研究发现道德情绪在感知欺骗和不满之间发挥了中介作用。

研究意义

本研究揭示了游客对旅游欺诈的反应及其内在机制, 并提出了降低旅游欺诈负面影响的方法, 为旅游目的地提供了启示。

创意/价值

这是探索游客如何应对旅游欺诈事件的首批研究之一。

Estafas turísticas, emociones morales y comportamientos: impactos en las emociones morales, la insatisfacción, la intención de volver a visitar y el boca a boca negativo

Resumen

Propósito

Basándose en la teoría de eventos afectivos (AET), este estudio buscó explorar la relación entre el engaño percibido por los turistas y las emociones morales, la insatisfacción, la intención de volver a visitar y el boca a boca negativo.

Diseño/metodología/enfoque

Para probar el modelo de investigación propuesto se utilizaron datos en línea procedentes de un cuestionario. Se recogieron un total de 437 cuestionarios válidos.

Hallazgos

Los resultados sugieren que las estafas turísticas como “eventos afectivos” podrían desencadenar emociones morales e insatisfacción en los turistas, disminuyendo así su intención de volver a visitar y generando un boca a boca negativo. Además, se encontró que las emociones morales actúan como mediadoras entre el engaño percibido y la insatisfacción.

Limitaciones/implicaciones de la investigación

Los conocimientos descubiertos en este estudio revelan los mecanismos detrás de las reacciones de los turistas a las estafas y brindan implicaciones para los destinos turísticos, sugiriendo formas de mitigar el impacto adverso de las estafas turísticas.

Originalidad/valor

Este es el primer estudio que examina las reacciones de los turistas a las estafas turísticas.

Article
Publication date: 5 February 2020

Jacqueline M. Drew

The evolution of digital technology has changed the way in which we, as a global society, socialise and conduct business. This growth has led to an increasing reliance on…

2929

Abstract

Purpose

The evolution of digital technology has changed the way in which we, as a global society, socialise and conduct business. This growth has led to an increasing reliance on technology, much more interconnectedness and in turn, an expansion of criminal opportunities, known now as “cybercrime”. This study aims to explore the experience of victimisation, perceptions of cybercrime and use of online crime prevention strategies.

Design/methodology/approach

The study involved a survey of a representative sample of the adult Australian population. The study sample was made up of 595 Australian adult participants. The study seeks to better understand how previous victimisation, perception of cybercrime prevalence and perception of harm caused by cybercrime are related to the use of online crime prevention strategies. It seeks to contribute to a body of work that has found that crime prevention education focused on increasing knowledge is limited in its effectiveness in reducing victimisation.

Findings

This study identifies key levers, in particular perceived prevalence and harm of cybercrime, as critical in the use of online crime prevention strategies by potential victims.

Research limitations/implications

As such, this study provides an important evidence base on which to develop more effective online crime prevention education and awareness campaigns to reduce cybervictimisation.

Practical implications

The practical implications include the relationship between cybervictimisation and self-protective online strategies of potential victims and the development of more effective online crime prevention programmes.

Originality/value

The research takes a different perspective from much of the previous research, seeking to better understand how attitudinal factors (perceived prevalence of cybercrime and perceived harm of cybercrime) might motivate or influence the use of online crime prevention strategies by potential victims.

Details

Journal of Criminological Research, Policy and Practice, vol. 6 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 5 October 2012

Vinod Pathari and Rajendra Sonar

The information security policy document of an organization needs to be translated into controls and procedures at the implementation level. The technical and business personnel…

1461

Abstract

Purpose

The information security policy document of an organization needs to be translated into controls and procedures at the implementation level. The technical and business personnel in‐charge of implementing the controls and procedures need to consider a large number of security‐related statements from a heterogeneous pool of security documentation and decide on the implementation plan. The purpose of this paper is to propose an approach to analyze a set of security statements to establish an implicit hierarchy and relative importance among them.

Design/methodology/approach

A set of statements relevant to e‐mail service security is chosen from the classified documentation of an IT firm. The authors contacted the technical person who was the owner of this service to obtain a one‐on‐one comparison between the policies. These policies and their inter‐relationships are represented as a graph. Centrality measures based on the in and out degrees of a node are used to calculate the relative importance of a policy. The authors present an improved approach based on DEMATEL, which considers the level of influence of one policy on another.

Findings

Security statements fall into different categories based on their relative intensity and nature. They could be of high importance or low on one axis and of driving or receiving nature on the other. The driver policies are the action items that could be implemented to satisfy a large number of other security requirements. The policies that are predominantly receiver in nature, for their fulfillment, need many other requirements to be satisfied.

Practical implications

The intense driver policies are the ones to be considered for immediate implementation so as to achieve maximum benefits. If such an action item cannot be implemented at the level of consideration, it needs to be communicated to the appropriate level where it could be addressed effectively. An orphaned policy statement can indicate to a high‐level requirement left without any action plan or an unnecessary control. Establishing clear linkages between the implemented controls and the organization's security policy document could be very effective in convincing the employees to adhere to security practices.

Originality/value

Analyzing a set of informal security statements to identify the linkages between them is a novel idea. While other works establish the need for translating the security policy to lower levels of implementation, the authors propose an approach to identify the existence or absence of an effective translation. The graph representation with associated centrality measures, and the application of DEMATEL technique to deduce the nature and intensity of security statements are not yet found in literature.

1 – 10 of 399