Search results

1 – 10 of 205
Article
Publication date: 1 April 2006

H. Labuschagne and G. Els

The Prevention and Combating of Corrupt Activities Act, Act 12 of 2004, was instituted to curb corrupt activities. It imposes a duty on people in positions of authority to report…

Abstract

The Prevention and Combating of Corrupt Activities Act, Act 12 of 2004, was instituted to curb corrupt activities. It imposes a duty on people in positions of authority to report corrupt or suspected corrupt activities and related activities. However, auditors are not listed in this Act as persons in a position of authority. This article discusses whether, despite the fact that the Prevention and Combating of Corrupt Activities Act does not place such a reporting duty on an auditor, auditors nevertheless have a duty in terms of other legislation to report any unlawful activities that they uncover in the course of their work, or which they suspect to have been committed. The article also examines whether auditors are required to consider the risk of corruption.

Article
Publication date: 30 September 2019

Boris Urban and Mmapoulo Lindah Nkhumishe

Many unanswered questions remain regarding the authors’ understanding of how entrepreneurship can be fostered in the public sector. To fill this knowledge gap, the purpose of this…

Abstract

Purpose

Many unanswered questions remain regarding the authors’ understanding of how entrepreneurship can be fostered in the public sector. To fill this knowledge gap, the purpose of this paper is to conduct an empirical investigation to determine the relationship between different organisational factors and entrepreneurial orientation (EO) in the South African public sector.

Design/methodology/approach

Primary data are sourced from middle-level managers at municipalities in the three largest provinces across South Africa. Hypotheses are statistically tested using regression analyses.

Findings

Results reveal that the organisational antecedents of structure and culture explain a significant amount of variation in the EO dimensions of innovativeness, risk taking and proactiveness. Additionally, the findings on organisational rewards converge with an emerging stream of research which highlights that while rewards works well to motivate individuals in the private sector, they are negatively correlated with entrepreneurship in the public sector.

Research limitations/implications

The study implications relate to the efficiency and effectiveness of service delivery of municipalities in South Africa. Due to increases in community protest actions, it is necessary not only to maximise efficiency in the provision of services, but also to innovate and be proactive in order to achieve more with less resources.

Originality/value

By investigating previously unrelated factors in the public sector, the authors create closer conceptual and empirical links between the role of organisational factors and each of the EO dimensions. Furthermore, the study takes place in a relatively under-researched entrepreneurship and public sector context.

Details

Journal of Entrepreneurship and Public Policy, vol. 8 no. 4
Type: Research Article
ISSN: 2045-2101

Keywords

Article
Publication date: 8 February 2021

Vahid Molla Imeny, Simon D. Norton, Mahdi Moradi and Mahdi Salehi

This study aims to compare judicial and auditor expectations of audit in the detection and reporting of money laundering in Iran. It also aims to assess the implications of…

Abstract

Purpose

This study aims to compare judicial and auditor expectations of audit in the detection and reporting of money laundering in Iran. It also aims to assess the implications of expectations gap for the reliability of data provided to the Financial Action Task Force (FATF) in its blacklisting policy.

Design/methodology/approach

Questionnaires were administered to auditors to determine perceptions of their anti-money laundering (AML) reporting obligations. These were also completed by Iranian judges who hear money laundering prosecutions and who agreed to participate in the research. The group was created through the “snowballing” technique.

Findings

There is significant divergence between judges and auditors regarding the latter’s AML reporting obligations. Self-perception among auditors regarding investigative duties is insufficiently aligned with expectations of the FATF, particularly where there is use of corporate structures, charities and trusts in which identity of true owners, of payers and payees of funds cannot be accurately verified. This gap presents a significant terrorist financing risk.

Practical implications

The expectations gap makes training in forensic accounting, as well as compliance with international reporting expectations, a matter of urgency for the Iranian auditing profession. The judiciary needs to be more aware of international expectations.

Originality/value

Data regarding judicial expectations of auditors’ AML reporting obligations is difficult to obtain and of a highly sensitive nature. This research has obtained such data which has relevance to the FATF blacklisting policy, and to international organisations tasked with disrupting terrorist financing networks.

Details

Journal of Money Laundering Control, vol. 24 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 10 August 2015

Clinton Free

This article aims to review popular frameworks used to examine fraud and earmarks three areas where there is considerable scope for academic research to guide and inform important…

4322

Abstract

Purpose

This article aims to review popular frameworks used to examine fraud and earmarks three areas where there is considerable scope for academic research to guide and inform important debates within organisations and regulatory bodies.

Design/methodology/approach

The article reviews published fraud research in the fields of auditing and forensic accounting, focusing on the development of the dominant framework in accounting and fraud examination, the fraud triangle. From this review, specific avenues for future research are identified.

Findings

Three under-researched issues are identified: rationalisation of fraudulent behaviours by offenders; the nature of collusion in fraud; and regulatory attempts to promote whistle-blowing. These topics highlight the perspective of those directly involved in fraud and draw together issues that have interested researchers in other disciplines for decades with matters that are at the heart of contemporary financial management across the globe.

Originality/value

In spite of the profound economic and reputational impact of fraud, the research in accounting remains fragmented and emergent. This review identifies avenues offering scope to bridge the divide between academia and practice.

Details

Meditari Accountancy Research, vol. 23 no. 2
Type: Research Article
ISSN: 2049-372X

Keywords

Article
Publication date: 7 June 2021

Rabih Nehme, Amir Michael and Jim Haslam

A survey is here systematically conducted to analyse auditors’ perceptions of dysfunctional auditing behaviour (DAB). As a result of many accounting scandals and litigations faced…

Abstract

Purpose

A survey is here systematically conducted to analyse auditors’ perceptions of dysfunctional auditing behaviour (DAB). As a result of many accounting scandals and litigations faced by audit firms, this paper aims to assess whether factors leading to DAB are embedded in audit firms’ practices.

Design/methodology/approach

The sample used in this study comprises auditors at all levels of employment with the big four audit firms in the United Kingdom (UK). DAB is analysed using two signals/indicators: premature sign-off and under-reporting of chargeable time. Time budget pressure and time deadline pressure are the factors considered here as potentially pushing auditors to exhibit DAB. A careful and considered analysis and interpretation is here articulated. Additionally, the sample individuals are divided into audit trainees and experienced auditors to assess any potential differences in the perception of DAB that reflect the experience factor.

Findings

Coordination with internal auditors, different perceptions between audit trainees and experienced auditors of dysfunctional behaviour, working during their personal time and the box-ticking exercise are amongst the findings that may help practitioners to understand the reasons behind dysfunctional behaviour and identify measures to mitigate it.

Originality/value

The study can aid concerned executives and audit partners to minimise DAB related to different time pressures by casting light on the key ethical issues. The study is conducted on a sample of the big four firms in the UK covering all organisational structure. It assesses if experience plays a role in the perception of DAB.

Details

Meditari Accountancy Research, vol. 30 no. 2
Type: Research Article
ISSN: 2049-372X

Keywords

Article
Publication date: 12 November 2018

Adéle Da Veiga

Employee behaviour is a continuous concern owing to the number of information security incidents resulting from employee behaviour. The purpose of this paper is to propose an…

2754

Abstract

Purpose

Employee behaviour is a continuous concern owing to the number of information security incidents resulting from employee behaviour. The purpose of this paper is to propose an approach to information security culture change management (ISCCM) that integrates existing change management approaches, such as the ADKAR model of Prosci, and the Information Security Culture Assessment (ISCA) diagnostic instrument (questionnaire), to aid in addressing the risk of employee behaviour that could compromise information security.

Design/methodology/approach

The ISCCM approach is constructed based on literature and the inclusion of the ISCA diagnostic instrument. The ISCA diagnostic instrument statements are also presented in this paper. The ISCCM approach using ISCA is illustrated using data from an empirical study.

Findings

The ISCCM approach was found to be useful in defining change management interventions for organisations using the data of the ISCA survey. Employees’ perception and acceptance of change to ensure information security and the effectiveness of the information security training initiatives improved significantly from the as-is survey to the follow-up survey.

Research limitations/implications

The research illustrates the ISCCM approach and shows how it should be combined with the ISCA diagnostic instrument. Future research will focus on including a qualitative assessment of information security culture to complement the empirical data.

Practical implications

Organisations do not have to rely on or adapt organisational development approaches to change their information security culture – they can use the proposed ISCCM approach, which has been customised from information security and change management approaches, together with the presented ISCA questionnaire, to address information security culture change purposefully.

Originality/value

The proposed ISCCM approach can be applied to complement existing information security management approaches through a holistic and structured approach that combines the ADKAR model, Prosci’s approach of change management and the ISCA diagnostic instrument. It will enable organisations to focus on transitioning to a positive or desired information security culture that mitigates the risk of the human element in the protection of information.

Details

Information & Computer Security, vol. 26 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 December 2004

Hein S. Venter, Martin S. Olivier and Jan H.P. Eloff

It is well‐known that the primary threat against misuse of private data about individuals is present within the organisation; proposes a system that uses intrusion detection…

1061

Abstract

It is well‐known that the primary threat against misuse of private data about individuals is present within the organisation; proposes a system that uses intrusion detection system (IDS) technologies to help safeguard such private information. Current IDSs attempt to detect intrusions on a low level whereas the proposed privacy IDS (PIDS) attempts to detect intrusions on a higher level. Contains information about information privacy and privacy‐enhancing technologies, the role that a current IDS could play in a privacy system, and a framework for a privacy IDS. The system works by identifying anomalous behaviour and reacts by throttling access to the data and/or issuing reports. It is assumed that the private information is stored in a central networked repository. Uses the proposed PIDS on the border between this repository and the rest of the organisation to identify attempts to misuse such information. A practical prototype of the system needs to be implemented in order to determine and test the practical feasibility of the system. Provides a source of information and guidelines on how to implement a privacy IDS based on existing IDSs.

Details

Internet Research, vol. 14 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 26 July 2022

Meharaj Banu Abdul Sathar, Malini Rajagopalan, Shaik Mohamed Naina and Satyanarayana Parayitam

This study aims to investigate the relationship between perceived usefulness, ease of use and adoption of online banking by customers in the Indian context. Using the technology…

Abstract

Purpose

This study aims to investigate the relationship between perceived usefulness, ease of use and adoption of online banking by customers in the Indian context. Using the technology acceptance model (TAM) as the base, this study underscores the importance of perceived enjoyment, security and trust in influencing customer satisfaction.

Design/methodology/approach

Using a structured survey instrument, this paper gathered data from 476 respondents in the southern part of India. First, the instrument’s psychometric properties were tested, and hypotheses were tested using Hayes’s PROCESS macros.

Findings

The results indicated that (i) perceived usefulness and perceived ease of use are positively related to the attitude of the consumers to use online banking, (ii) attitude to use is positively related to adoption intention and (iii) adoption intention positively predicts customer satisfaction. The results also reveal that (i) perceived enjoyment moderates the relationship between attitude to use and adoption intention, (ii) trust moderates the relationship between adoption intention and customer satisfaction and (iii) security (second moderator) moderates the moderated relationship between trust (first moderator) and adoption intention on customer satisfaction.

Research limitations/implications

As with any survey research, self-report measures have the inherent problems of common method bias and social desirability bias. However, the authors have taken adequate care to minimize these limitations. In addition, the research has implications for consumer behavior concerned with online banking.

Practical implications

This study contributes to both practicing managers and the literature on online banking. The study suggests that bank managers need to focus on ensuring security and earning customers’ trust to motivate them to adopt online banking.

Social implications

The study contributes to society by unraveling the antecedent conditions leading to accepting innovative changes initiated by banks. Especially in rural and cooperative banks, customers adopting online banking helps save their time and energy in visiting the physical locations of banks.

Originality/value

This study provides new insights into the complex relationships among variables contributing to customer satisfaction. The double-layered moderated moderated-mediation conceptual model developed and tested in this study is a novel idea that makes a significant contribution to the growing literature on online banking.

Details

Journal of Asia Business Studies, vol. 17 no. 3
Type: Research Article
ISSN: 1558-7894

Keywords

Article
Publication date: 9 October 2017

Jeremiah D. Still, Ashley Cain and David Schuster

Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been…

Abstract

Purpose

Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been developed. This paper aims to present and explain a list of human-centered guidelines for developing usable authentication schemes.

Design/methodology/approach

The guidelines stem from research findings within the fields of psychology, human–computer interaction and information/computer science.

Findings

Instead of viewing users as the inevitable weak point in the authentication process, this study proposes that authentication interfaces be designed to take advantage of users’ natural abilities. This approach requires that one understands how interactions with authentication interfaces can be improved and what human capabilities can be exploited. A list of six guidelines that designers ought to consider when developing a new usable authentication scheme has been presented.

Research limitations/implications

This consolidated list of usable authentication guidelines provides system developers with immediate access to common design issues impacting usability. These guidelines ought to assist designers in producing more secure products in fewer costly development cycles.

Originality/value

Cybersecurity research and development has mainly focused on technical solutions to increase security. However, the greatest weakness of many systems is the user. It is argued that authentication schemes with poor usability are inherently insecure, as users will inadvertently weaken the security in their efforts to use the system. The study proposes that designers need to consider the human factors that impact end-user behavior. Development from this perspective will address the greatest weakness in most security systems by increasing end-user compliance.

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 November 2016

Wayne D. Kearney and Hennie A. Kruger

The purpose of this paper is to discuss and theorise on the appropriateness and potential impact of risk homeostasis in the context of information security.

Abstract

Purpose

The purpose of this paper is to discuss and theorise on the appropriateness and potential impact of risk homeostasis in the context of information security.

Design/methodology/approach

The discussion is mainly based on a literature survey backed up by illustrative empirical examples.

Findings

Risk homeostasis in the context of information security is an under-explored topic. The principles, assumptions and methodology of a risk homeostasis framework offer new insights and knowledge to explain and predict contradictory human behaviour in information security.

Practical implications

The paper shows that explanations for contradictory human behaviour (e.g. the privacy paradox) would gain from considering risk homeostasis as an information security risk management model. The ideas discussed open up the prospect to theorise on risk homeostasis as a framework in information security and should form a basis for further research and practical implementations. On a more practical level, it offers decision makers useful information and new insights that could be advantageous in a strategic security planning process.

Originality/value

This is the first systematic comprehensive review of risk homeostasis in the context of information security behaviour and readers of the paper will find new theories, guidelines and insights on risk homeostasis.

Details

Information & Computer Security, vol. 24 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 205