Search results

1 – 10 of 701
Article
Publication date: 3 January 2023

Abdullah Oguz, Nikhil Mehta and Prashant Palvia

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…

Abstract

Purpose

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.

Design/methodology/approach

The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.

Findings

A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.

Originality/value

As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.

Article
Publication date: 22 January 2020

Norah Ylang

This paper aims to examine demographic differences between individuals who do not take measures to protect themselves from identity theft victimization and those who do. A…

Abstract

Purpose

This paper aims to examine demographic differences between individuals who do not take measures to protect themselves from identity theft victimization and those who do. A majority of the research on identity theft has focused on predictors of victimization, reporting behaviors of the victims and their health and mental outcomes. However, little remains known about the individuals who choose to take any identity-theft measures despite concerns over this fast-growing breed of crime.

Design/methodology/approach

Guided by Felson and Cohen’s routine activities theoretical framework (1979), this study uses the 2014 Identity Theft Supplement of the National Crime Victimization Survey to identify the demographic characteristics that influence the use of self-protection measures among individuals in the general population.

Findings

This study finds that these individuals are much more likely to be white, older, female and highly educated. The decision to undertake protection against identity theft is also influenced by the following factors: prior experience of misuse, possession of a bank account in the prior 12 months, current possession of at least one credit card and awareness that one is entitled to a free copy of one’s credit report.

Originality/value

This study addresses the gap in scholarship on identity theft prevention by applying the concept of guardianship in Cohen and Felson’s routine activity theory (1979) to the usage of self-protection measures in a general population. Future findings will identify the areas which agencies and researchers can focus on to inform policies that foster individuals’ own initiatives to take self-protection measures against potential identity theft.

Details

Journal of Financial Crime, vol. 27 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 27 May 2014

Richard Baskerville, Eun Hee Park and Jongwoo Kim

The purpose of this paper is to develop and evaluate an integrated computer abuse model that incorporates both organizational abuse settings and the psychological processes of the…

Abstract

Purpose

The purpose of this paper is to develop and evaluate an integrated computer abuse model that incorporates both organizational abuse settings and the psychological processes of the abuser.

Design/methodology/approach

The paper developed an emote opportunity (EO) model through a comprehensive literature review and conducted a case study to evaluate the explanatory and prescriptive usefulness of the model.

Findings

The EO model helps explain the interaction between organization-centric factors and individual-centric factors. It also helps explain how potential computer abusers elicit an emotion process component that ultimately contributes to computer abuse behaviors. The model connects both organizational external regulation processes and individual internal regulation processes to emote process components of potential abusers.

Research limitations/implications

The study considers only organizational computing resources as the target of computer abuse. The model is evaluated by historical data from a computer abuse case. Future research with contemporary empirical data would further evaluate these findings. Organizations should be aware of the opportunities they create for abuse and the emotional state-of-mind of potential abusers within organizations.

Practical implications

Organizations should take a holistic approach that incorporates personal emotions and organizational abuse opportunity settings to prevent computer abuse.

Originality/value

A multilevel, integrated EO model incorporating organizational environment and individual emotion processes provides an elaborated and holistic understanding of computer abuse. The model helps organizations consider the emotional state-of-mind of abusers as well as their organizational situation.

Details

Information Technology & People, vol. 27 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 14 September 2015

Kate L. Daunt (née Reynolds) and Dominique A. Greer

This study aims to use opportunity as a theoretical lens to investigate how the spatio-temporal and social dimensions of the consumption environment create perceived opportunities…

1965

Abstract

Purpose

This study aims to use opportunity as a theoretical lens to investigate how the spatio-temporal and social dimensions of the consumption environment create perceived opportunities for consumers to misbehave.

Design/methodology/approach

Drawing on routine activity theory and social impact theory, the authors use two experiments to demonstrate that spatio-temporal and social dimensions can explain consumer theft in retail settings.

Findings

Study 1 reveals mixed empirical support for the basic dimensions of routine activity theory, which posits that the opportunity to thieve is optimised when a motivated offender, suitable target and the absence of a capable formal guardian transpire in time and space. Extending the notion of guardianship, Study 2 tests social impact theory and shows that informal guardianship impacts the likelihood of theft under optimal routine activity conditions.

Originality/value

The study findings highlight important implications for academicians and retail managers: rather than focusing on the uncontrollable characteristics of thieving offenders, more controllable spatio-temporal and social factors of the retail environment can be actively monitored and manipulated to reduce perceived opportunities for consumer misbehaviour.

Details

European Journal of Marketing, vol. 49 no. 9/10
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 10 August 2022

Ummaha Hazra and Asad Karim Khan Priyo

While online classes have enabled many universities to carry out their regular academic activities, they have also given rise to new and unanticipated ethical concerns. We focus…

Abstract

Purpose

While online classes have enabled many universities to carry out their regular academic activities, they have also given rise to new and unanticipated ethical concerns. We focus on the “dark side” of online class settings and attempt to illuminate the ethical problems associated with them. The purpose of this study is to investigate the affordances stemming from the technology-user interaction that can result in negative outcomes. We also attempt to understand the context in which these deleterious affordances are actualized.

Design/methodology/approach

We obtain the data from narratives written by students at a top private university in Bangladesh about their experiences of online classes and exams and from focus group discussions with them. We use the lens of affordance theory to identify the abilities that goal-oriented actors – primarily students – obtain from the technology-user interactions, which result in negative outcomes. We also attempt to understand the contextual actualization of those affordances through the lens of Routine Activity Theory (RAT).

Findings

We find three deleterious affordances and three associated deviant outcomes. Non-monitorability which results in academic dishonesty, disguiseability which results in cyber-truancy, and intrudeability which results in embarrassment and harassment. Our findings reveal a deeper underlying problem with the existing educational approach in the universities of Bangladesh and suggest that there is a need to introduce more modern teaching techniques focused on issues such as student engagement and interactive learning.

Originality/value

To the best of our knowledge, this is the first paper that combines affordance theory with RAT to identify unethical practices observed in online class settings in the context of a least developed country like Bangladesh and to examine the environmental components that give rise to the pre-conditions for the unethical practices to surface.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 4 October 2019

Balkrushna Potdar, Tony Garry, John Guthrie and Juergen Gnoth

The purpose of this paper is to explore how interactional justice within a retail context may influence employee organizational commitment and how this may evoke guardianship

Abstract

Purpose

The purpose of this paper is to explore how interactional justice within a retail context may influence employee organizational commitment and how this may evoke guardianship behaviors that manifest in shoplifting prevention.

Design/methodology/approach

This research uses a phenomenological approach conducting semi-structured in-depth interviews with 26 shop-floor employees of two major national supermarket chains in New Zealand.

Findings

The findings suggest that interactional justice in the workplace is important in shaping organizational commitment amongst employees. Additionally, heightened organizational commitment may have a significant effect on employee propensity to engage in shoplifting prevention/guardianship behavior. A conceptual model is developed based on these findings.

Practical implications

Retail managers may promote and exercise interactional justice practices with employees to improve their organizational commitment and consequential shoplifting prevention/guardianship behaviors.

Originality/value

The contribution of this paper is threefold. First, and from a theoretical perspective, it offers both a conceptual foundation and empirical-based evaluation of interactional justice and its effect on organizational commitment and, specifically, on guardianship/shoplifting prevention behaviors. Second, and from a pragmatic perspective, the conceptual model derived from this research may assist retailers in developing interactional justice strategies that encourage organizational commitment of employees that consequently leads to employees’ guardianship/shoplifting prevention behaviors. Finally, it explores significance and role of employee perceptions of interactional justice, employee workplace attachment and organizational commitment within the context of retail crime prevention.

Details

International Journal of Retail & Distribution Management, vol. 48 no. 1
Type: Research Article
ISSN: 0959-0552

Keywords

Article
Publication date: 10 October 2023

Stefano De Paoli and Jason Johnstone

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this…

Abstract

Purpose

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts.

Design/methodology/approach

The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis.

Findings

The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation.

Originality/value

This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 April 2019

Saslina Kamaruddin and Zaiton Hamin

The purpose of this paper is to provide some empirical findings on the predicaments of lawyers’ anti-money laundering (AML) compliance in Malaysia and the rationales for such…

Abstract

Purpose

The purpose of this paper is to provide some empirical findings on the predicaments of lawyers’ anti-money laundering (AML) compliance in Malaysia and the rationales for such predicaments.

Design/methodology/approach

This paper adopts a qualitative research in which the primary data are obtained from seven case studies involving legal firms within the Klang Valley, Selangor, Malaysia, which is triangulated with the data from the Central Bank and the Malaysian Bar Council.

Findings

The authors contend that despite the vulnerability of their profession to money laundering, the level of awareness of the AML obligations amongst Malaysian legal practitioners is rather minimal. Also, the imposition of obligations upon them in policing their clients and regulating money laundering is not only onerous but also contrary to the ethics of their profession.

Originality/value

This paper fills the gap in providing the empirical evidence on lawyers’ compliance to their statutory AML obligations in Malaysia. Also, this paper could be a useful source of information for practitioners, academicians and students. It could also be a beneficial guide for policymakers for any possible future amendments to the law.

Details

Journal of Financial Crime, vol. 26 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 18 May 2021

Michelle Marie Esposito and Anna King

In early 2020, the world faced a rapid life-changing pandemic in the form of the Coronavirus Disease of 2019 (COVID-19) crisis. Citywide lockdowns with stay-at-home orders and…

1816

Abstract

Purpose

In early 2020, the world faced a rapid life-changing pandemic in the form of the Coronavirus Disease of 2019 (COVID-19) crisis. Citywide lockdowns with stay-at-home orders and mass closings quickly became the “new normal.” With these new mandates, routine activity, mental health and financial securities all began to experience major deviations, and it became clear that this could prove to be rather valuable in providing the opportunity for large-scale criminology experiments. This study aims to explore New York City's (NYC) crime patterns during this unique social situation. Specifically, has crime as a whole increased or decreased, and have particular crimes increased or decreased during these stressful fluid times?

Design/methodology/approach

The authors briefly review previous crises and worldwide trends but focus on NYC crime as collected by the New York Police Department's statistics unit, “CompStat.” An analysis of 13 crime types from March 30 to July 5 was completed, including percent differences and individual weekly incidence rates in citywide crimes compared to the same time in 2019.

Findings

The analysis demonstrated that all crimes analyzed, except for murder and burglary, exhibited a statistically significant difference during COVID-19 conditions compared to the same time the previous year. Grand larceny auto and gun violence crimes significantly increased during COVID-19 weeks, whereas rape, other sex crimes, robbery, felony assault, grand larceny, transit, housing, misdemeanor assault and petit larceny all significantly decreased.

Originality/value

Due to the ongoing nature of the pandemic, this is amongst the first studies to examine trends in NYC crime during pandemic mandates. Expanding our knowledge in these situations can inform natural disaster responses, as well as criminal justice policy and practice to better protect the public in future crises.

Details

Journal of Criminal Psychology, vol. 11 no. 3
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 20 June 2016

Paul Cozens and Marc Tarca

The purpose of this paper is to investigate “image management” as an important element within the concept to the Crime prevention through environmental design (CPTED). Globally…

1371

Abstract

Purpose

The purpose of this paper is to investigate “image management” as an important element within the concept to the Crime prevention through environmental design (CPTED). Globally, guidance tends to focus on promoting surveillance and few studies have explored how vacant poorly maintained housing might affect perceptions of crime and CPTED.

Design/methodology/approach

This paper contrasts the perceptions of 168 members of the public and 12 built environment professionals with regards to a detached property in Perth, Western Australia. Using two photographs to elicit responses (one poorly maintained and one well-maintained) respondents were asked about their perceptions of crime, and the extent to which CPTED features were perceived to be present. These results are contrasted with a site audit of the CPTED qualities visible in both images.

Findings

The CPTED audit recorded significantly higher scores for the well-maintained property than for the poorly maintained dwelling. Most respondents indicated they felt less safe, perceived more crime and lower levels of CPTED in relation to the poorly maintained house. The findings provide support that there is a link between poorly maintained housing and the perceptions of CPTED, crime and the fear of crime.

Originality/value

This innovative study utilised two photographic images of the same property to probe “image management”, perceptions of crime and CPTED qualities. It highlights the need to consider these issues throughout the different stages of the development process and presents idea of the “cradle to the grave” life-cycle of criminal opportunities.

Details

Property Management, vol. 34 no. 3
Type: Research Article
ISSN: 0263-7472

Keywords

1 – 10 of 701