Search results

1 – 10 of 264
Article
Publication date: 14 October 2020

Huawei Wang

The purpose of this study is to investigate the understanding and application of crime of sabotaging production and operation in internet era, and, at the same time, discuss the…

Abstract

Purpose

The purpose of this study is to investigate the understanding and application of crime of sabotaging production and operation in internet era, and, at the same time, discuss the basic position for criminal law interpretation in cyberspace.

Design/methodology/approach

Doctrinal analysis and case study.

Findings

Along with the advent of the internet era, how to apply the traditional crime of sabotaging production and operation in virtual space has attracted people’s attention. The controversy caused by the conviction of malicious application of fake transactions is a typical example. The legal interest protected here includes not only the property value of the means of production itself, but also the expectation interest that can be obtained by normal production and operation activities. There is no reliable basis to believe that overlap of articles between special provision and general laws occurs in crime of sabotaging production and operation and crime of intentional damage of property. The production and operation activities carried out online can also be covered by crime of sabotaging production and operation, without doubt. Ejusdem Generis Rule should be fully respected, but crime of sabotaging production and operation has a dual structure of means behavior and purpose behavior, where the purpose behavior, sabotaging production and operation, is the key to the conviction. However, it is not necessarily premised on physical damage and violent characteristics. The understanding and application of traditional crimes should keep pace with the times in the internet era, and we should not stick to a completely rigid subjective interpretation.

Originality/value

This study demonstrates the possible application of crime of sabotaging production and operation in cyberspace, and clarifies many misunderstandings about this crime.

Details

Journal of Financial Crime, vol. 28 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 15 May 2023

Satinder Singh, Sarabjeet Singh and Tanveer Kajla

Purpose: The study aims to explore the wider acceptance of blockchain technology and growing faith in this technology among all business domains to mitigate the chances of fraud…

Abstract

Purpose: The study aims to explore the wider acceptance of blockchain technology and growing faith in this technology among all business domains to mitigate the chances of fraud in various sectors.

Design/Methodology/Approach: The authors focus on studies conducted during 2015–2022 using keywords such as blockchain, fraud detection and financial domain for Systematic Literature Review (SLR). The SLR approach entails two databases, namely, Scopus and IEEE Xplore, to seek relevant articles covering the effectiveness of blockchain technology in controlling financial fraud.

Findings: The findings of the research explored different types of business domains using blockchains in detecting fraud. They examined their effectiveness in other sectors such as insurance, banks, online transactions, real estate, credit card usage, etc.

Practical Implications: The results of this research highlight (1) the real-life applications of blockchain technology to secure the gateway for online transactions; (2) people from diverse backgrounds with different business objectives can strongly rely on blockchains to prevent fraud.

Originality/Value: The SLR conducted in this study assists in the identification of future avenues with practical implications, making researchers aware of the work so far carried out for checking the effectiveness of blockchain; however, it does not ignore the possibility of zero to less effectiveness in some businesses which is yet to be explored.

Details

Contemporary Studies of Risks in Emerging Technology, Part B
Type: Book
ISBN: 978-1-80455-567-5

Keywords

Article
Publication date: 29 March 2021

Ramaraj Palanisamy and Yang Wu

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for…

488

Abstract

Purpose

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility?

Design/methodology/approach

These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables.

Findings

The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues.

Research limitations/implications

The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems.

Practical implications

The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES.

Social implications

Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES.

Originality/value

This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Abstract

Details

The Definitive Guide to Blockchain for Accounting and Business: Understanding the Revolutionary Technology
Type: Book
ISBN: 978-1-78973-865-0

Article
Publication date: 7 November 2022

Pramukh Nanjundaswamy Vasist and Satish Krishnan

This study aims to establish a comprehensive understanding of the intricacies of how individuals engage with deepfakes, focusing on limiting adverse effects and capitalizing on…

1062

Abstract

Purpose

This study aims to establish a comprehensive understanding of the intricacies of how individuals engage with deepfakes, focusing on limiting adverse effects and capitalizing on their benefits.

Design/methodology/approach

This study conducted a meta-synthesis of qualitative studies on deepfakes, incorporating study-specific analysis followed by a cross-study synthesis.

Findings

Based on the meta-synthesis, the study developed an integrated conceptual framework based on the perspectives from the social shaping of technology theory embedding deepfake-related assertions, motivations, the subtleties of digital platforms, and deepfake-related repercussions.

Research limitations/implications

The study offers crucial insights into the evolving nature of deepfakes as a socio-technical phenomenon and the significance of platform dynamics in deepfake production. It enables researchers to comprehend the cascading effects of deepfakes and positions them to evaluate deepfake-related risks and associated mitigation mechanisms.

Practical implications

The framework that emerges from the study illustrates the influence of platforms on the evolution of deepfakes and assists platform stakeholders in introducing effective platform governance structures to combat the relentless proliferation of deepfakes and their consequences, as well as providing guidance for governments and policymakers to collaborate with platform leaders to set guardrails for deepfake engagement.

Originality/value

Deepfakes have been extensively contested for both their beneficial and negative applications and have been accused of heralding an imminent epistemic threat that has been downplayed by some quarters. This diversity of viewpoints necessitates a comprehensive understanding of the phenomenon. In responding to this call, this is one of the first to establish a comprehensive, theoretically informed perspective on how individuals produce, process, and engage with deepfakes through a meta-synthesis of qualitative literature on deepfakes.

Details

Internet Research, vol. 33 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 29 March 2013

Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber and Edgar Weippl

Today's database management systems implement sophisticated access control mechanisms to prevent unauthorized access and modifications. For instance, this is an important basic…

Abstract

Purpose

Today's database management systems implement sophisticated access control mechanisms to prevent unauthorized access and modifications. For instance, this is an important basic requirement for SOX (Sarbanes‐Oxley Act) compliance, whereby every past transaction has to be traceable at any time. However, malicious database administrators may still be able to bypass the security mechanisms in order to make hidden modifications to the database. This paper aims to address these issues.

Design/methodology/approach

In this paper the authors define a novel signature of a B+‐tree, a widely‐used storage structure in database management systems, and propose its utilization for supporting the logging in databases. This additional logging mechanism is especially useful in conjunction with forensic techniques that directly target the underlying tree‐structure of an index. Several techniques for applying this signature in the context of digital forensics on B+‐trees are proposed in the course of this paper. Furthermore, the authors' signature can be used to generate exact copies of an index for backup purposes, thereby enabling the owner to completely restore data, even on the structural level.

Findings

For database systems in enterprise environments, compliance to regulatory standards such as SOX (Sarbanes‐Oxley Act), whereby every past transaction has to be traceable at any time, is a fundamental requirement. Today's database management systems usually implement sophisticated access control mechanisms to prevent unauthorized access and modifications. Nonetheless malicious database administrators would be able to bypass the security mechanisms in order to make modifications to the database, while covering their tracks.

Originality/value

In this paper, the authors demonstrate how the tree structure of the underlying store engine can be used to enhance forensic logging mechanisms of the database. They define a novel signature for B+‐trees, which are used by the InnoDB storage engine. This signature stores the structure of database storage files and can help in reconstructing previous versions of the file for forensic purposes. Furthermore, the authors' signature can be used to generate exact copies of an index for backup purposes, thus enabling the owner to completely restore data, even on the structural level. The authors applied their concept to four real‐life scenarios in order to evaluate its effectiveness.

Details

International Journal of Web Information Systems, vol. 9 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 29 May 2019

Michail Vafeiadis, Denise S. Bortree, Christen Buckley, Pratiti Diddi and Anli Xiao

The dissemination of fake news has accelerated with social media and this has important implications for both organizations and their stakeholders alike. Hence, the purpose of

5378

Abstract

Purpose

The dissemination of fake news has accelerated with social media and this has important implications for both organizations and their stakeholders alike. Hence, the purpose of this study is to shed light on the effectiveness of the crisis response strategies of denial and attack in addressing rumors about consumer privacy when non-profit organizations are targeted on social media.

Design/methodology/approach

To test the hypotheses, a 2 (response type: denial vs attack) × 2 (privacy concerns: low vs high), between-group online experiment was conducted via Qualtrics.

Findings

The results indicated that one’s involvement level in the issue determines the effectiveness of the crisis response strategy. Data showed that attacking the source of fake news (as a crisis response) reduces the message’s credibility more than denying fake news. Furthermore, highly involved individuals are more likely to centrally process information and develop positive supportive intentions toward the affected non-profit brand. High issue involvement also predicted organizational and response credibility. Conversely, an attack rebuttal message increased the credibility of the circulated malicious rumors for low involved individuals.

Research limitations/implications

The findings suggest that issue involvement plays a key role in message perceptions of false information regarding consumer privacy in social media.

Practical implications

Practically, this study offers insights for organizations that are developing response strategies in the current environment of fake news. Findings from this study suggest that organizations need to consider the degree to which audiences are currently involved in an issue before deciding how aggressively to respond to perpetrators of fake news.

Originality/value

The present study examines the intersection of fake news and crisis management in the non-profit sector, with an emphasis on various response strategies and issue involvement. This is one of the first attempts to experimentally investigate how social media strategies can defend and protect non-profit reputation in the fake news era.

Details

Journal of Product & Brand Management, vol. 29 no. 2
Type: Research Article
ISSN: 1061-0421

Keywords

Book part
Publication date: 8 July 2021

Joshua Ellul, Alex Grech and Gordon J. Pace

One of the rallying cries of the blockchain community is that of immutability: the irreversibility of the past, the absolute truth which, once stored, remains there forever. The…

Abstract

One of the rallying cries of the blockchain community is that of immutability: the irreversibility of the past, the absolute truth which, once stored, remains there forever. The technology was designed with this foundational pillar in mind to ensure that changes to history are inordinately expensive and practically impossible to execute – and increasingly so, the further in the past the event which one intends to manipulate lies. This platonic view of absolute truth is in stark contrast with a world of manipulated truth, and it is not surprising that it is being revisited as a means of combating fake news. We argue that claims to the absolute nature of the blockchain are at best exaggerated, at worst misrepresented or even ‘fake news’. We discuss implicit centralised points of trust in blockchains, whether at a technological, social or governance level, and identify how these can be a threat to the ‘immutable truth’ stored within the blockchain itself. A global pandemic has unleashed an unprecedented wave of contradictory positions on anything from vaccines and face masks to ‘the new normal’. It is only natural that the pursuit of blockchain as a placebo for society's ‘truth’ problems continues.

Details

Media, Technology and Education in a Post-Truth Society
Type: Book
ISBN: 978-1-80043-907-8

Keywords

Article
Publication date: 19 May 2022

Audrey de Rancourt-Raymond and Nadia Smaili

The purpose of this study is to discuss the harmful use of deepfakes in an organizational context, based on the only two cases the authors found that were addressed by the media…

1892

Abstract

Purpose

The purpose of this study is to discuss the harmful use of deepfakes in an organizational context, based on the only two cases the authors found that were addressed by the media from the perspective of corporate fraud. This study offers an overview of deepfake technology, and in particular, examines five W questions to better decipher the impact of these tools on organizations: What is deepfake? Who is the fraudster and who is targeted? Why use them and how? And What after? Based on these five W questions, this study provides an in-depth discussion of the two cases identified. Even though this technology has several advantages, this study examines its dark side.

Design/methodology/approach

Using comparative analysis, the authors study the only two known and publicized fraud cases by using deepfakes that have targeted chief executive officers to date.

Findings

The paper provides an extensive picture of the unethical and illicit use of deepfakes in an organizational context and discusses how this technology could affect fraud risk. In addition, the analysis of cases shows that voice-generating software, combined with other fraud schemes such as business email compromise, facilitates the commission of the fraud, as the victims feel confident because they recognize the speaker’s voice and emails. The analysis shows that any organization could be vulnerable to this technology. The median costs of this type of fraud can be high. For the two cases identified, the estimated losses amounted to US$243,000 and US$35,000,000, respectively.

Originality/value

This paper adds new insights to the scarce research on deepfakes and financial crime by investigating the causes and consequences of the unethical and illicit use of deepfakes. It has several implications for organizations, boards of directors, management and regulatory authorities.

1 – 10 of 264