Search results

1 – 10 of 68
Article
Publication date: 3 January 2023

Abdullah Oguz, Nikhil Mehta and Prashant Palvia

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…

Abstract

Purpose

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.

Design/methodology/approach

The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.

Findings

A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.

Originality/value

As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.

Article
Publication date: 6 April 2023

Amy Bittick and Ryan Holliman

The purpose of this study is to consider informed consent with those who may be legally judged incapable of consent. Frequently individuals with traumatic brain injuries and…

Abstract

Purpose

The purpose of this study is to consider informed consent with those who may be legally judged incapable of consent. Frequently individuals with traumatic brain injuries and intellectual disabilities may fall into this category. This paper seeks to consider aspects of guardianship, moral and legal implications and best practices for mental health professionals.

Design/methodology/approach

This practice piece reviews literature regarding informed consent, as well as pertinent issues in the professional literature regarding types of guardianship as well as the occurrence of “Lucid intervals.” Furthermore, literature from moral philosophy and current legal research was examined to fully provide readers with a grasp of the legal and ethical landscape of this issue.

Findings

The paper finds that treating consent as a one-time binary event is lacking in both practicality and nuance. Moral philosophy and issues regarding paternalism are raised, as well as practice approaches to assessment of capability and how to engage in therapy in meaningful ways.

Originality/value

This paper provides insight into providing dignity-affirming therapy with a population that is often not considered in the literature of mental health ethics. When it is considered, the suggestions are so vague as to be of limited use. This manuscript provides nuance and practical applications to be a therapist that promotes dignity in those who might have varying levels of capacity to consent.

Details

Advances in Mental Health and Intellectual Disabilities, vol. 17 no. 2
Type: Research Article
ISSN: 2044-1282

Keywords

Article
Publication date: 10 October 2023

Stefano De Paoli and Jason Johnstone

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this…

Abstract

Purpose

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts.

Design/methodology/approach

The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis.

Findings

The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation.

Originality/value

This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 17 January 2023

Tessa Cole

The criminalization of online financial fraud is examined by analyzing the existing literature, policies and state statutes within the context of the cybercrime ecosystem…

Abstract

Purpose

The criminalization of online financial fraud is examined by analyzing the existing literature, policies and state statutes within the context of the cybercrime ecosystem. Therefore, this paper aims to investigate online fraud policies within the USA and the prevalence of such incidents to explore the effectiveness of current fraud policies.

Design/methodology/approach

This examination explores policies related to online fraud within the USA by defining online financial fraud incidents within the context of the cybercrime ecosystem and analyzing such incidents with routine activities theory to emphasize the current legislative inadequacies with provisional policy recommendations.

Findings

This research suggests online financial fraud is not unanimously conceptualized among regulating or criminal institutions. Although federal regulators have governed financial institutions, federal institutions have failed to account for the capabilities of computer-mediated and technological device use (12 USC §1829).

Research limitations/implications

The limited research analyzing the effectiveness of guardianship that prevents or deters internet-mitigated or dependent financial fraud crimes.

Practical implications

Policy recommendations include but are not limited to mandating federal and privatized financial institutions to disclose all fraudulent activity to all stakeholders (e.g. customers and local and federal criminal justice agencies).

Originality/value

This paper provides an innovative approach using a criminological theory and policy framework to examine the prevalence of online fraud and the regulations enacted to counteract such violations.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 3 October 2023

Ellie Norris, Shawgat Kutubi, Steven Greenland and Ruth Wallace

This research aims to examine the performativity of corporate reports as an example of an accounting inscription that can frame the relationship between Aboriginal and Torres…

Abstract

Purpose

This research aims to examine the performativity of corporate reports as an example of an accounting inscription that can frame the relationship between Aboriginal and Torres Strait Islander entities and their stakeholders. The framing and overflow effects of these reports have been explored to consider whether they strengthen or undermine the reputation and capability of these community-controlled entities.

Design/methodology/approach

Aligned with actor–network theory and a decolonising research protocol, qualitative interviews were conducted with senior managers and directors of Aboriginal and Torres Strait Islander entities and their key stakeholders to explore their experiences of corporate reporting. Additional analysis of these organisations' annual reports was conducted to corroborate key reporting themes.

Findings

This research has identified a dual role for corporate reporting, simultaneously framing performance against an expectation of failure, but with the potential for accounting inscriptions to highlight positive contributions to cultural and community priorities. It also indicates the need for sector specifics within the reporting frameworks and adequate resourcing for Aboriginal and Torres Strait Islander entities to meet reporting obligations.

Practical implications

This research makes policy-based recommendations in terms of user-driven and culturally informed performance measures. It also highlights the importance of adequate funding for Aboriginal and Torres Strait Islander entities to carry out meaningful performance evaluations beyond the preparation of financial statements.

Originality/value

One of the few empirical studies to capture the performativity of accounting inscriptions from the perspective of Aboriginal and Torres Strait Islander entities. This sector has received minimal attention within the accounting discipline, despite significantly contributing to community well-being and cultural protection. There is emancipatory potential via policy frameworks that resonate with Aboriginal and Torres Strait Islander cultural beliefs and practices.

Details

Accounting, Auditing & Accountability Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0951-3574

Keywords

Article
Publication date: 17 October 2022

Ojeifoh Okosun and Uchenna Ilo

The purpose of this paper is to critically examine the evolution of a particular variant of cyber fraud known as the Nigerian prince scam and to demonstrate its socio-cultural…

Abstract

Purpose

The purpose of this paper is to critically examine the evolution of a particular variant of cyber fraud known as the Nigerian prince scam and to demonstrate its socio-cultural impact. These scams are also referred to as yahoo scams. This paper traces the history of the Nigerian prince scam and how the scheme has evolved over the years to become more sophisticated, audacious and damaging to its victims.

Design/methodology/approach

The analytic approach is conceptual, drawing on institutional anomie theory, social learning theory and routine activity theory to explain this unique typology of cybercrime. Data were collected and analysed from books, journal articles, newspaper articles and other electronic Web sources.

Findings

The ineffective political leadership of Nigeria’s present elected and past military leaders could be attributed to creating culturally induced pressures to secure monetary success by the scammers. A significant number of people involved in this malfeasance justify these crimes with the argument of being owed reparations for colonisation, which might explain why international and local agencies may not be effective at eradicating this crime problem.

Originality/value

Despite the continued perpetration of the Nigerian prince scam, current research has not presented an evolutionary view of this fraudulent operation. This paper adds to the literature by explaining the origins of the scam, how they have developed over time and how internet technology has advanced the sophistication of the scam.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 29 December 2023

Samir Alamad

This study aims to investigate the claim that there is no coherent and homogeneous body of concepts and practices that can be classified as “Islamic accounting”.

Abstract

Purpose

This study aims to investigate the claim that there is no coherent and homogeneous body of concepts and practices that can be classified as “Islamic accounting”.

Design/methodology/approach

The study focuses specifically on Islamic accounting and uses a qualitative historical documentary analysis methodology to study an original manuscript from the 14th century.

Findings

The analysis of the manuscript argues that religious accounting can be seen as a value-based system for achieving social good and that in the context of Islamic accounting, it can be conceptualised as a coherent body of ideas and practices.

Originality/value

Firstly, the study conceptualises Islamic accounting as a homogeneous discipline with its own knowledge, concepts and practices. Secondly, it contributes to current accounting literature by examining an ancient manuscript from the 14th century, which serves as a foundation for understanding the Islamic accounting system within the context of accounting, religion and spirituality. The paper further contributes by arguing that this conceptualisation of religious accounting as a value-based approach enables its practitioners to evaluate their own accountabilities in delivering on socioeconomic objectives related to inter-human/environmental, social and financial transactions within the context of religious accounting practices.

Details

Journal of Accounting Literature, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-4607

Keywords

Article
Publication date: 3 April 2023

Daniele Scarpi, Eleonora Pantano and Davit Marikyan

During emergencies and times of widespread social fear, such as wars and epidemics, society witnesses many instances of consumer misbehaviour (e.g. panic buying). Therefore, this…

Abstract

Purpose

During emergencies and times of widespread social fear, such as wars and epidemics, society witnesses many instances of consumer misbehaviour (e.g. panic buying). Therefore, this study aims to understand what drives consumers to enact socially irresponsible while shopping during emergencies.

Design/methodology/approach

This study employs a quantitative approach with 400 responses from consumers who shopped during the pandemic.

Findings

Results show a positive relationship between consumers' awareness of the negative social consequences of shopping misbehaviour and their ascription of responsibility, which is positively moderated by death-by-emergency-related anxiety. Ascription of responsibility, in turn, has a positive impact on socially responsible behaviour.

Originality/value

This research is the first to examine new applications of norm activation theory in retailing. Furthermore, this research is the first to extend the theory by examining psychological factors that may regulate socially irresponsible behaviour. The research demonstrates the significant role of anxiety and attachment in facilitating the impact of awareness of negative consequences and aspirations of responsibility in the retailing during emergencies.

Details

International Journal of Retail & Distribution Management, vol. 51 no. 6
Type: Research Article
ISSN: 0959-0552

Keywords

Article
Publication date: 9 April 2024

Ahesha Perera

This study aims to examine the value orientations of New Zealand agribusiness investors and how these orientations influence their reactions to the environmental and social…

Abstract

Purpose

This study aims to examine the value orientations of New Zealand agribusiness investors and how these orientations influence their reactions to the environmental and social implications of agribusinesses.

Design/methodology/approach

In the context of the New Zealand agricultural sector, the views of investors as published in print and broadcast media between 2018 and 2022 are gathered. The study uses qualitative content analysis to analyse the data. The study is based on the value-belief-norm theory.

Findings

The study reveals that New Zealand agribusiness investors express concern about the environmental (biospheric) and social (altruistic) impacts of the agribusiness sector, prompting calls for greater transparency, climate adaptation and ethical investment options. Additionally, they actively support local businesses to benefit their communities and preserve cultural heritage. Despite these biospheric and altruistic tendencies, investors also prioritise financial and non-financial interests (egoistic). This highlights a nuanced perspective guiding their investment choices – a balance between self-interest and contributing to the greater good. This signals a shift towards socially and environmentally responsible investment practices driven by multifaceted values.

Research limitations/implications

The findings of this study highlight the role of non-pecuniary motives, like values, in determining the relevance of environmental and social information.

Practical implications

The study’s findings offer insight to agribusinesses on how investors’ value orientations shape their investment decisions. This understanding can guide businesses in framing a reporting strategy that enhances the likelihood of investors perceiving reporting as relevant and persuasive, thereby attracting more investments. In turn, this tailored reporting approach assists investors in making well-informed decisions in assessing the environmental and societal risks of agribusinesses.

Originality/value

The study offers a framework explaining how agribusinesses can increase the likelihood of investors finding firms reporting relevant and persuasive, leading to increased investments in environmentally and socially sustainable practices.

Details

Social Responsibility Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1747-1117

Keywords

Article
Publication date: 1 January 2024

Keshnee Padayachee

This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale…

Abstract

Purpose

This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study. This paper aims to present the preliminary findings of an investigation that explored the constructs of personality traits and situational crime prevention theory (SCPT) as antecedents to social cognitive determinants (attitude, perceived behavioural control and subjective norms using the theory of planned behaviour [TPB] framing) and how these elements subsequently estimate compliant information security behaviour. Moreover, this paper delves into the contrasting influences of light and dark personality traits on insider information security compliance.

Design/methodology/approach

A cross-sectional survey was conducted to study SCPT measures and the personality factors dyad using a diverse but limited sample (n = 82).

Findings

There were ten significant direct relationships between SCPT factors and personality traits related to the components of the TPB. Seventeen hypotheses were not supported. However, these findings highlight the complexity of the topic under study.

Practical implications

Understanding individual differences within the compliance model could be used for custom training protocols, employee selection, assignment and specific types of information security interventions.

Originality/value

There is a scarcity of studies considering the effects of situational and personality factors, specifically the dark versus light triad of personality traits within the information security domain. Therefore, this preliminary result provides early insight that could guide further studies. This research could have important implications for organisations at risk of insider attacks.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 68