Search results

1 – 10 of 34
Article
Publication date: 1 March 2000

Charles Abrams

After first being issued in draft in July 1998 and then taking a year to go through Parliament, the Financial Services and Markets Act 2000 (FISMA) finally became law on 14th…

Abstract

After first being issued in draft in July 1998 and then taking a year to go through Parliament, the Financial Services and Markets Act 2000 (FISMA) finally became law on 14th June, 2000. The Treasury, the government department responsible for the UK financial services industry, has, however, just announced that the FISMA will not come fully into force until summer 2001, although some sections may perhaps come into force earlier.

Details

Journal of Financial Regulation and Compliance, vol. 8 no. 3
Type: Research Article
ISSN: 1358-1988

Article
Publication date: 1 March 2001

The Economic Secretary to HM Treasury, Miss Melanie Johnson, announced on 15th March that ‘N2’, the date on which most of the Financial Services and Markets Act 2000 will be…

Abstract

The Economic Secretary to HM Treasury, Miss Melanie Johnson, announced on 15th March that ‘N2’, the date on which most of the Financial Services and Markets Act 2000 will be implemented, will definitely take place before the end of November 2001. That important and long awaited announcement has been followed by a spate of government and parliamentary activity in order to put in place essential elements of the secondary legislation that HM. Treasury has the power to make under the Financial Services and Markets Act 2000 (FISMA). Much of that Act, important as it is to changing the structure, policy grounding and direction of UK financial regulation, is enabling in effect and leaves many key areas, such as, the scope of the general prohibition on carrying on regulated activities without authorisation or exemption, to be detailed by secondary legislation. On 9th May Miss Melanie Johnson made a further significant announcement in response to a parliamentary question, namely that the provisions of FISMA which confer rule‐making powers and status as the sole financial regulator on the Financial Services Authority (FSA) will be commenced on 18th June, 2001. This is necessary in order to enable it legally to ‘make’ and therefore finalise its by now very extensive Handbook of Rules and Guidance so that firms can prepare for N2 on the basis of its content. The following Orders and Regulations have already been made with the main effects as described.

Details

Journal of Financial Regulation and Compliance, vol. 9 no. 3
Type: Research Article
ISSN: 1358-1988

Article
Publication date: 14 January 2019

Sherry Li Xie

This paper aims to report on a study that aimed at analyzing the relationships between information security and records management (RM), both as programs/functions established in…

1711

Abstract

Purpose

This paper aims to report on a study that aimed at analyzing the relationships between information security and records management (RM), both as programs/functions established in organizations. Similar studies were not found in relevant literature.

Design/methodology/approach

The study used the classic grounded theory methodology. Pursuing the general curiosity about the information security-RM relationship in organizations, the study selected the United States (US) Federal Government as its field of entrance and followed the process of the classic grounded theory methodology that starts from the letting of the emergence of the research question to the formulation of a substantive theory that answered the question.

Findings

On the emergent question that why, despite the legislative establishment of agency RM programs and the use of the term records in their work, the US Federal Government information security community considered RM a candidate for deletion (CFD), the study coded the truncated application of the encompassing definition of records as the underlying reason. By this code, along with its three properties, i.e. limitations by the seemingly more encompassing coverage of information, insufficient legislative/regulatory support and the use of the terms of evidence and preservation in the records definition, the CFD consideration and the associated phenomena of unsound legislative/regulatory conceptualization, information shadow, information ignorance and archival shadow were explained.

Research limitations/implications

The study results suggested the data for subsequent theoretical sampling to be the operational situations of individual agency RM programs.

Practical implications

The rationale presented in the study regarding the encompassing nature of records and the comprehensive scope of RM program can be used for building strong RM business cases.

Originality/value

The study appears to be the first of its kind, which examined the RM–information security relationship in a very detailed setting.

Details

Records Management Journal, vol. 29 no. 1/2
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 9 May 2016

H. Frank Cervone

Information professionals are increasing called upon to provide access and services for information that, by its nature, must be restricted to certain uses or classes of…

738

Abstract

Purpose

Information professionals are increasing called upon to provide access and services for information that, by its nature, must be restricted to certain uses or classes of individuals. This paper aims to explore the six major compliance regulations in the USA that information professionals should have a basic understanding of to manage a restricted information environment effectively.

Design/methodology/approach

This paper is a general review of laws and requirements in the USA related to information security that may affect information professionals in their work.

Findings

The world of information security is complex and there are multiple laws, guidelines and standards that apply. For information professionals managing or deploying digital repositories or information archives, all of these need to be considered because plans and systems are being developed. Information professionals will increasingly be called upon to lend their expertise to emerging preservation problems related to restricted data, so understanding the basics of information security law is a requirement to successful information practice.

Originality/value

This is the first general overview of this area of information practice.

Details

Digital Library Perspectives, vol. 32 no. 2
Type: Research Article
ISSN: 2059-5816

Keywords

Article
Publication date: 17 June 2020

Rajni Goel, Anupam Kumar and James Haddow

This study aims to develop a framework for cybersecurity risk assessment in an organization. Existing cybersecurity frameworks are complex and implementation oriented. The…

1621

Abstract

Purpose

This study aims to develop a framework for cybersecurity risk assessment in an organization. Existing cybersecurity frameworks are complex and implementation oriented. The framework can be systematically used to assess the strategic orientation of a firm with respect to its cybersecurity posture. The goal is to assist top-management-team with tailoring their decision-making about security investments while managing cyber risk at their organization.

Design/methodology/approach

A thematic analysis of existing publications using content analysis techniques generates the initial set of keywords of significance. Additional factor analysis using the keywords provides us with a framework comprising of five pillars comprising prioritize, resource, implement, standardize and monitor (PRISM) for assessing a firm’s strategic cybersecurity orientation.

Findings

The primary contribution is the development of a novel PRISM framework, which enables cyber decision-makers to identify and operationalize a tailored approach to address risk management and cybersecurity problems. PRISM framework evaluation will help organizations identify and implement the most tailored risk management and cybersecurity approach applicable to their problem(s).

Originality/value

The new norm is for companies to realize that data stratification in cyberspace extends throughout their organizations, intertwining their need for cybersecurity within business operations. This paper fulfills an identified need improve the ability of company leaders, as CIOs and others, to address the growing problem of how organizations can better handle cyber threats by using an approach that is a methodology for cross-organization cybersecurity risk management.

Details

Information & Computer Security, vol. 28 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 December 2018

Petros Kavassalis, Harald Stieber, Wolfgang Breymann, Keith Saxton and Francis Joseph Gross

The purpose of this study is to propose a bearer service, which generates and maintains a “digital doppelgänger” for every financial contract in the form of a dynamic transaction…

2722

Abstract

Purpose

The purpose of this study is to propose a bearer service, which generates and maintains a “digital doppelgänger” for every financial contract in the form of a dynamic transaction document that is a standardised “data facility” automatically making important contract data from the transaction counterparties available to relevant authorities mandated by law to request and process such data. This would be achieved by sharing certain elements of the dynamic transaction document on a bearer service, based on a federation of distribution ledgers; such a quasi-simultaneous sharing of risk data becomes possible because the dynamic transaction document maintain a record of state in semi-real time, and this state can be verified by anybody with access to the distribution ledgers, also in semi-real time.

Design/methodology/approach

In this paper, the authors propose a novel, regular technology (RegTech) cum automated legal text approach for financial transaction as well as financial risk reporting that is based on cutting-edge distributed computing and decentralised data management technologies such as distributed ledger (Swanson, 2015), distributed storage (Arner et al., 2016; Chandra et al., 2013; Caron et al., 2014), algorithmic financial contract standards (Brammertz and Mendelowitz, 2014; Breymann and Mendelowitz, 2015; Braswell, 2016), automated legal text (Hazard and Haapio, 2017) and document engineering methods and techniques (Glushko and McGrath, 2005). This approach is equally inspired by the concept of the “bearer service” and its capacity to span over existing and future technological systems and substrates (Kavassalis et al., 2000; Clark, 1988).

Findings

The result is a transformation of supervisors’ capacity to monitor risk in the financial system based on data which preserve informational content of financial instruments at the most granular level, in combination with a mathematically robust time stamping approach using blockchain technology.

Practical implications

The RegTech approach has the potential to contain operational risk linked to inadequate handling of risk data and to rein in compliance cost of supervisory reporting.

Originality value

The present RegTech approach to financial risk monitoring and supervisory reporting is the first integration of algorithmic financial data standards with blockchain functionality.

Details

The Journal of Risk Finance, vol. 19 no. 1
Type: Research Article
ISSN: 1526-5943

Keywords

Article
Publication date: 1 February 2000

David Kirk

The fight against financial crime, as we enter the 21st century, becomes daily more complex. Crime is said to be big, international, capable of destabilising small countries and…

Abstract

The fight against financial crime, as we enter the 21st century, becomes daily more complex. Crime is said to be big, international, capable of destabilising small countries and bringing down large companies. It affects us all. At the same time, police powers are being eroded by bleeding‐heart liberal do‐gooders who introduce civil liberties into every argument and rely on the Human Rights Convention at every turn.

Details

Journal of Money Laundering Control, vol. 3 no. 4
Type: Research Article
ISSN: 1368-5201

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Article
Publication date: 14 June 2022

Fabian Maximilian Johannes Teichmann and Chiara Wittmann

The threat of cybercrime is pervasive. Corporations cannot be convinced, out of sheer luck or naïve conviction, that they will remain unaffected. When targeted, the stark reality…

Abstract

Purpose

The threat of cybercrime is pervasive. Corporations cannot be convinced, out of sheer luck or naïve conviction, that they will remain unaffected. When targeted, the stark reality is that a company also incurs a liability risk. This paper aims to explore the boundaries of liability resulting from a data breach and privacy concerns according to the emerging regulations on cybersecurity.

Design/methodology/approach

The nature of cybercrime and its constant evolution is analysed as a threat of liability. Its distinctly modern developments require consideration. In response to the threat of hackers, the protection that a corporation can invoke is also considered as a mitigating factor in ascribing liability.

Findings

Preventative steps to protect a corporation from cyberthreats must remain a consistent priority in the running of a company. The influence of human behaviour has become a foreseeable element in cybersecurity and as such the management of unreliable user behaviour is a key determining factor in ascribing liability in hindsight.

Originality/value

Foresight is everything in the prevention of cyberattacks. Cyberattacks can no longer be dismissed as an unlikely eventuality. Legislation on data security and data privacy is demanding higher standards of preventative action, under the duty of care to stakeholders. There is a substantial literature deficit on data security and data liability regulations in light of the liability risk incurred by cyberattacks.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 17 March 2017

Kartikeya Bajpai and Klaus Weber

We examine the translation of the concept of privacy in the advent of digital communication technologies. We analyze emerging notions of informational privacy in public discourse…

Abstract

We examine the translation of the concept of privacy in the advent of digital communication technologies. We analyze emerging notions of informational privacy in public discourse and policymaking in the United States. Our analysis shows category change to be a dynamic process that is only in part about cognitive processes of similarity. Instead, conceptions of privacy were tied to institutional orders of worth. Those orders offered theories, analogies, and vocabularies that could be deployed to extrapolate the concept of privacy into new domains, make sense of new technologies, and to shape policy agendas.

Details

From Categories to Categorization: Studies in Sociology, Organizations and Strategy at the Crossroads
Type: Book
ISBN: 978-1-78714-238-1

Keywords

1 – 10 of 34