Search results

1 – 10 of 128
Article
Publication date: 8 August 2023

Wahyu Fahrul Ridho

The purpose of this study is to critically examine a prevalent online scam mechanism, with the aim of understanding its exploitation of behavioral finance principles and group…

Abstract

Purpose

The purpose of this study is to critically examine a prevalent online scam mechanism, with the aim of understanding its exploitation of behavioral finance principles and group dynamics and propose effective countermeasures.

Design/methodology/approach

This study uses a blend of case study and thematic analysis, drawing from behavioral finance, social psychology and criminology, using primary source testimonies of victims to provide a detailed exploration of the scam’s operations.

Findings

This research uncovers the strategic use of four key principles: loss aversion, overconfidence, scarcity bias and social proof, within the scam operation. These tendencies are manipulated to induce victims to progressively invest into the fraudulent scheme, even amid growing suspicions.

Research limitations/implications

While the research elucidates on the workings of one specific online scam, it is necessary to explore if and how these principles are used in various other online fraudulent schemes, to develop comprehensive countermeasures.

Practical implications

The findings underscore the urgent need for enhanced public awareness, stronger corporate responsibility and robust regulatory oversight. There is a call for concerted efforts encompassing public education campaigns, fortified security protocols and strong legal frameworks for preventing such scams.

Social implications

The research emphasizes the need for collective action in ensuring a safe online space. This involves the individual user’s prudence, businesses’ proactive education initiatives and stringent legal actions against fraudulent activities.

Originality/value

This research offers novel insights into the nuanced manipulation of behavioral finance principles within online scams, based on empirical data from victim testimonials. These findings contribute to the understanding of the psychological mechanisms at play in online scams and are instrumental in formulating effective preventive strategies.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 19 October 2023

Rasha Kassem and Elisabeth Carter

This paper aims to systematically review over two decades of academic articles on romance fraud to provide a holistic insight into this crime and identify literature gaps.

Abstract

Purpose

This paper aims to systematically review over two decades of academic articles on romance fraud to provide a holistic insight into this crime and identify literature gaps.

Design/methodology/approach

More than two decades of peer-reviewed academic journal articles from 2000 to 2023 were systematically reviewed using multiple search engines and databases for relevant papers, identified through searches of paper titles, keywords, abstracts and primary texts.

Findings

The findings reveal 10 themes: i) the definitions and terminology of romance fraud; ii) romance fraud’s impact on victims; iii) the profile of romance fraud criminals and victims; iv) romance fraud methods and techniques; v) why victims become susceptible to romance fraud; vi) the psychology of romance fraud criminals; vii) the links between romance fraud and other crimes; viii) the challenges of investigating romance fraud; ix) preventing romance fraud and protecting victims; and x) how romance fraud victims can be supported.

Practical implications

The paper reveals implications regarding the future direction of policy and strategy to address the pervasive low reporting rates and narratives of shame bound with victims of this crime.

Originality/value

Romance fraud is a serious crime against individuals with impacts beyond financial losses. Still, this fraud type is under-researched, and the literature lacks a holistic view of this crime. To the best of the authors’ knowledge, this is the first systematic literature review providing a holistic view of romance fraud. It combines evidence across the academic landscape to reveal the breadth and depth of the current work concerning romance fraud and identify gaps in the understanding of this fraud crime.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 14 March 2024

Hasibul Islam, Lalmi Soumia, Masud Rana, Jhansi Bharathi Madavarapu and Shimanto Saha

This study analyzed the relationship between mobile financial services (MFS) usage and customer satisfaction with MFS in Bangladesh, considering perception, purpose of use and…

Abstract

Purpose

This study analyzed the relationship between mobile financial services (MFS) usage and customer satisfaction with MFS in Bangladesh, considering perception, purpose of use and technical challenges as the primary factors influencing customer satisfaction with MFS. The aim is to determine the factors most influencing the use of MFS.

Design/methodology/approach

Data were collected from 400 MFS users through a structured web survey using snowball sampling that is consistent with the nature of MFS users who are difficult to identify or locate. Structural equation modeling (SEM) was used to analyze the data and evaluate the reliability and validity of the measurement model.

Findings

The results show that customers’ perceptions and satisfaction significantly impact their intention to use MFS. Specifically, customers’ perceptions strongly influence their satisfaction with MFS, and the purpose of use significantly predicts both perception and satisfaction. Technical problems and challenges were found to have no significant impact on satisfaction levels, but other factors were more critical. Furthermore, the integration of innovative technological solutions is crucial for fostering sustainability in MFS, as it enhances reliability and efficiency while minimizing environmental footprints.

Research limitations/implications

The study was conducted in a single country, relied on self-reported data, and used a cross-sectional design, which limits the ability to draw causal inferences. Future research could explore the factors that influence customer satisfaction with MFS in different countries and regions and incorporate additional variables to provide a more comprehensive understanding of the drivers of customer satisfaction with MFS.

Originality/value

This study significantly contributes by extending the technology acceptance model (TAM) framework with the innovation resistance theory, offering a nuanced understanding of MFS adoption. The findings challenge conventional wisdom, highlighting the limited impact of technical problems on satisfaction and emphasizing the central role of user perceptions in shaping satisfaction and intention to use.

Details

Technological Sustainability, vol. 3 no. 2
Type: Research Article
ISSN: 2754-1312

Keywords

Article
Publication date: 15 May 2023

Asanga Abeyagoonasekera

This paper aims to examine the present Sri Lankan political-economic crisis and its connection to corruption. The paper will discuss the autocratic rule, elite domination of state…

Abstract

Purpose

This paper aims to examine the present Sri Lankan political-economic crisis and its connection to corruption. The paper will discuss the autocratic rule, elite domination of state extractive systems, which have been moulded and configured by Sri Lanka’s political environment over decades. Elite capture has become a significant factor. Sri Lanka’s authoritarian model exercised by Gotabaya Rajapaksa reduced competitive mode and shifted towards a monopolistic corruption structure, centralising on the first family and military rule where powerful elites supported the model. The paper attempts to find the connection between dysfunctional political model and economic crimes committed through several case studies.

Design/methodology/approach

The paper discusses five case studies using qualitative analysis using secondary data. The insider trading case study is discussed with quantitative data. Several political and social analyses were carried out with primary data captured from field research by the author.

Findings

Sri Lankan economic crisis was triggered because of high-level corruption. The autocratic model introduced by the political authority failed to fight corruption. Transnational mechanisms will fail if there is no credibility and commitment in their own respective nations such as in the USA. External factors such as China in Sri Lanka did have an impact for elite capture.

Research limitations/implications

This study is limited only to five case studies. Transnational mechanism and recommendations require a lengthy study. Only one external factor was assessed because of its significance; there could be other external factors for elite capture.

Practical implications

This study has limited access to capture primary data because of sensitivity during a heavy autocratic regime. Because of state and self-censorship, secondary data had to be tested.

Social implications

Economic crisis in Sri Lanka is an example to many developing nations fighting corruption. The autocratic family rule supported by external forces crippled the state anti-corruption processes. Economic crime is a key driver for poverty and economic crisis.

Originality/value

This is a unique paper that examines Sri Lanka’s present economic crisis and its political model and economic crime. The paper will discuss transnational mechanisms for anti-corruption and attempt to apply to the Sri Lankan crisis.

Open Access
Article
Publication date: 11 July 2023

Maja Golf-Papez and Barbara Culiberg

This paper aims to examine the types of user misbehaviours in the sharing economy (SE) context. SE offers a fruitful study setting due to the scope of potential misbehaviour and…

2103

Abstract

Purpose

This paper aims to examine the types of user misbehaviours in the sharing economy (SE) context. SE offers a fruitful study setting due to the scope of potential misbehaviour and the expanded role of consumers.

Design/methodology/approach

The study drew on online archival data from the AirbnbHell.com website, where people share their stories about their Airbnb-related negative experiences. The authors reviewed 405 hosts’, guests’ and neighbours’ stories and coded the identified forms of misbehaviours into categories. The typology thus developed was validated in the context of the Uber Rides service.

Findings

User misbehaviours in the SE context can be distinguished based on the domain in which the user role is violated and the nature of violated norms. These two conceptual distinctions delineate a four-fold typology of user misbehaviours: illegal, unprofessional, unbefitting and uncivil behaviours.

Research limitations/implications

The trustworthiness of the stories could not be assessed.

Practical implications

The presented typology can be used as a mapping tool that facilitates detection of the full scope of misbehaviours and as a managerial tool that provides ideas for effective management of misbehaviours that correspond to each category.

Originality/value

The paper presents the first empirically derived comprehensive typology of user misbehaviours in SE settings. This typology enables classification of a broad set of misbehaviours, including previously overlooked unprofessional behaviours carried out by peer-service providers. The study also puts forward a revised definition of consumer misbehaviours that encompasses the impact of misbehaviours on parties not directly involved in the SE-mediated exchange.

Details

European Journal of Marketing, vol. 57 no. 13
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 2 May 2023

Tianhao Xu and Prashanth Rajivan

Distinguishing phishing emails from legitimate emails continues to be a difficult task for most individuals. This study aims to investigate the psycholinguistic factors associated…

Abstract

Purpose

Distinguishing phishing emails from legitimate emails continues to be a difficult task for most individuals. This study aims to investigate the psycholinguistic factors associated with deception in phishing email text and their effect on end-user ability to discriminate phishing emails from legitimate emails.

Design/methodology/approach

Email messages and end-user decisions collected from a laboratory phishing study were validated and analyzed using natural language processing methods (Linguistic Inquiry Word Count) and penalized regression models (LASSO and Elastic Net) to determine the linguistic dimensions that attackers may use in phishing emails to deceive end-users and measure the impact of such choices on end-user susceptibility to phishing.

Findings

We found that most participants, who played the role of a phisher in the study, chose to deceive their end-user targets by pretending to be a familiar individual and presenting time pressure or deadlines. Results show that use of words conveying certainty (e.g. always, never) and work-related features in the phishing messages predicted higher end-user vulnerability. On the contrary, use of words that convey achievement (e.g. earn, win) or reward (cash, money) in the phishing messages predicted lower end-user vulnerability because such features are usually observed in scam-like messages.

Practical implications

Insights from this research show that analyzing emails for psycholinguistic features associated with computer-mediated deception could be used to fine-tune and improve spam and phishing detection technologies. This research also informs the kinds of phishing attacks that must be prioritized in antiphishing training programs.

Originality/value

Applying natural language processing and statistical modeling methods to analyze results from a laboratory phishing experiment to understand deception from both attacker and end-user is novel. Furthermore, results from this work advance our understanding of the linguistic factors associated with deception in phishing email text and its impact on end-user susceptibility.

Details

Information & Computer Security, vol. 31 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 10 May 2023

Kinshuk Saurabh

The aim of this study is to understand a family firm's choice of related-party transaction (RPT) types and analyze their value impacts to separate the abusive from benign RPTs.

Abstract

Purpose

The aim of this study is to understand a family firm's choice of related-party transaction (RPT) types and analyze their value impacts to separate the abusive from benign RPTs.

Design/methodology/approach

It uses a 10-year panel of BSE-listed 378 family (and 200 non-family) firms. The fixed effects, logit and difference-in-difference (DID) models help examine value effects, propensity and persistence of harmful RPTs.

Findings

Loans/guarantees (irrespective of counterparties) destroy firm value. Capital asset RPTs decrease the firm value but enhance value when undertaken with holding parties. Operating RPTs increase firm value and profitability. They improve asset utilization and reduce discretionary expenses (especially when made with controlled entities). Family firms have larger loans/guarantees and capital asset volumes but have smaller operating RPTs than non-family firms. They are less likely to undertake loans/guarantees (and even operating RPTs) and more capital RPTs vis-à-vis non-family firms. Family firms persist with dubious loans/guarantees but hold back beneficial operating RPTs, despite RPTs being in investor cross-hairs amid the Satyam scam.

Research limitations/implications

Rent extractability and counterparty incentives supplement each other. (1) The higher extractability of related-party loans and guarantees (RPLGs) dominates the lower extraction incentives of controlled parties. (2) Holding parties' bringing assets, providing a growth engine and adding value dominate their higher extraction incentives (3) The big gains to the operational efficiency come from operating RPTs with controlled parties, generally operating companies in the family house. (4) Dubious RPTs seem more integral to family firms' choices than non-family firms. (5) Counterparty incentives behind the divergent use of RPTs deserve more research attention. Future studies can give more attention to how family characteristics affect divergent motives behind RPTs.

Practical implications

First, the study does not single out family firms for dubious use of all RPTs. Second, investors, auditors or creditors must pay close attention to RPLGs as a special expropriation mechanism. Third, operating RPTs (and capital RPTs with holding parties) benefit family firms. However, solid procedural safeguards are necessary. Overall, results may help clarify the dilemma Indian regulators face in balancing the abusive and business sides of RPTs.

Originality/value

The study fills the gap by arguing why some RPTs may be dubious or benign and then shows how RPTs' misuse depends on counterparty types. It shows operating RPTs enhance operating efficiencies on several dimensions and that benefits may vary with counterparty types. It also presents the first evidence that family firms favor dubious RPTs more and efficient RPTs less than non-family firms.

Details

Asian Review of Accounting, vol. 31 no. 4
Type: Research Article
ISSN: 1321-7348

Keywords

Article
Publication date: 7 December 2022

Peter Ototsky, Sergey Manenkov and Alexander Smoliak

This study aims to demonstrate the importance of the requisite trust for the processes of digitalization of business, the state and society in general.

Abstract

Purpose

This study aims to demonstrate the importance of the requisite trust for the processes of digitalization of business, the state and society in general.

Design/methodology/approach

The work is built “from particular to general”. The analysis of many cases of digitalization projects leads to some higher-level principles useful for description most of them – trust, umwelt and complexity.

Findings

Based on the analysis of empirical material, the principle of requisite trust is introduced based on the definition of trust through a “relevant umwelt”. In addition, the article examines many aspects of society digitalization processes using cybernetic concepts. It is shown that (1) in the core of digitalization process is the export of the umwelt from human head to a computer (digital umwelt), (2) models used in the digital platforms are not only a reflection of social processes, but have a significant impact on them, like the observers of cybernetics of the second order and (3) umwelt concept is closely related to a social reality concept, meanings are relative and are carried by the communication systems.

Research limitations/implications

The paper summarized practical and theoretical experience in the field of digital projects and introduced The Law of Requisite Trust. In the future, this principle should be studied more formally in quantitative terms.

Originality/value

The principle of requisite trust, as well as the definition of trust through the relevant umwelt is original. The promotion of trust in organizations and also digital organizations using such instruments as standard of social responsibility (ISO 26000) has high practical value.

Details

Kybernetes, vol. 52 no. 9
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 10 November 2023

Vinay Kandpal

This qualitative study aims to examine bankers’ perspectives regarding financial inclusion, the challenges it faces and the scope for improvement. This research proposes a…

Abstract

Purpose

This qualitative study aims to examine bankers’ perspectives regarding financial inclusion, the challenges it faces and the scope for improvement. This research proposes a financial inclusion model, considering the inputs received by bankers. Financial exclusion of different sections is an issue common to emerging countries.

Design/methodology/approach

Data for qualitative research were collected through interviews with bank officials. The information was gathered from 32 bankers from India’s several zones (North, South, West and East). The data were collected from bankers from different public and private sector banks. Thematic analysis was performed up to the point of saturation to study the response received from bankers.

Findings

Bank-related issues such as frequent computer problems, network connectivity problems, costs, a shortage of bank branches, fewer transactions through automated teller machines and a shortage of banking staff affect customers’ confidence in formal banking. Banking services are disrupted by a lack of trust in banking correspondents (BCs), as they are not regular employees of banks. Limits on daily transactions discourage high-value customers from using BCs and kiosks. The time spent on administrative formalities impacts customers. Financial inclusion is affected by availability, accessibility, usage and affordability. Digital financial literacy is essential for ease of transaction, but awareness about financial products helps protect customers from cyber scams. The findings of this research would benefit financial institutions globally in developing their businesses and helping to achieve financial inclusion and the United Nation’s sustainable development goals (SDGs).

Originality/value

This research paper undertakes a qualitative analysis of the views collected from bankers. Bankers are crucial stakeholders in the successful implementation of the National Financial Inclusion Policy of the Government of India. Bankers’ perspectives will be important not only for India and its researchers but also in the global context, as the UN’s SDGs focus on leaving no one behind.

Details

Qualitative Research in Financial Markets, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1755-4179

Keywords

Expert briefing
Publication date: 28 June 2023

Most Asian states recognise the benefits of cryptocurrency adoption, such as low transaction costs for remittances and the introduction of blockchain technology into public…

Details

DOI: 10.1108/OXAN-DB280103

ISSN: 2633-304X

Keywords

Geographic
Topical
1 – 10 of 128