Search results

1 – 8 of 8
Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 17 June 2021

Ambica Ghai, Pradeep Kumar and Samrat Gupta

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered…

1115

Abstract

Purpose

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered with to influence public opinion. Since the consumers of online information (misinformation) tend to trust the content when the image(s) supplement the text, image manipulation software is increasingly being used to forge the images. To address the crucial problem of image manipulation, this study focusses on developing a deep-learning-based image forgery detection framework.

Design/methodology/approach

The proposed deep-learning-based framework aims to detect images forged using copy-move and splicing techniques. The image transformation technique aids the identification of relevant features for the network to train effectively. After that, the pre-trained customized convolutional neural network is used to train on the public benchmark datasets, and the performance is evaluated on the test dataset using various parameters.

Findings

The comparative analysis of image transformation techniques and experiments conducted on benchmark datasets from a variety of socio-cultural domains establishes the effectiveness and viability of the proposed framework. These findings affirm the potential applicability of proposed framework in real-time image forgery detection.

Research limitations/implications

This study bears implications for several important aspects of research on image forgery detection. First this research adds to recent discussion on feature extraction and learning for image forgery detection. While prior research on image forgery detection, hand-crafted the features, the proposed solution contributes to stream of literature that automatically learns the features and classify the images. Second, this research contributes to ongoing effort in curtailing the spread of misinformation using images. The extant literature on spread of misinformation has prominently focussed on textual data shared over social media platforms. The study addresses the call for greater emphasis on the development of robust image transformation techniques.

Practical implications

This study carries important practical implications for various domains such as forensic sciences, media and journalism where image data is increasingly being used to make inferences. The integration of image forgery detection tools can be helpful in determining the credibility of the article or post before it is shared over the Internet. The content shared over the Internet by the users has become an important component of news reporting. The framework proposed in this paper can be further extended and trained on more annotated real-world data so as to function as a tool for fact-checkers.

Social implications

In the current scenario wherein most of the image forgery detection studies attempt to assess whether the image is real or forged in an offline mode, it is crucial to identify any trending or potential forged image as early as possible. By learning from historical data, the proposed framework can aid in early prediction of forged images to detect the newly emerging forged images even before they occur. In summary, the proposed framework has a potential to mitigate physical spreading and psychological impact of forged images on social media.

Originality/value

This study focusses on copy-move and splicing techniques while integrating transfer learning concepts to classify forged images with high accuracy. The synergistic use of hitherto little explored image transformation techniques and customized convolutional neural network helps design a robust image forgery detection framework. Experiments and findings establish that the proposed framework accurately classifies forged images, thus mitigating the negative socio-cultural spread of misinformation.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 10 May 2023

Nasir Sultan, Norazida Mohamed, Mervyn Martin and Hafizah Mohd Latif

This study aims to examine the Financial Action Task Force’s recommendations on virtual currencies (VCs) and how Pakistan has responded to them.

Abstract

Purpose

This study aims to examine the Financial Action Task Force’s recommendations on virtual currencies (VCs) and how Pakistan has responded to them.

Design/methodology/approach

Qualitative document and jurisprudence analysis techniques were used to achieve the study’s goal.

Findings

According to this study, VCs are modern FinTech that no jurisdiction can ignore. However, Pakistan has not adopted regulations to govern VCs but comprehensively prohibits their use. It is primarily due to the apathy of various regimes and regulators. Furthermore, the geographical location, undocumented economy and rampant corruption could facilitate the abuse of VCs for money laundering.

Originality/value

This study has provided a significant overview for developing regulations for VCs in Pakistan and other developing jurisdictions with the same characteristics.

Details

Journal of Money Laundering Control, vol. 27 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 21 November 2023

Afzal Izzaz Zahari, Jamaliah Said, Kamarulnizam Abdullah and Norazam Mohd Noor

This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in…

Abstract

Purpose

This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in Malaysia.

Design/methodology/approach

The study used an open-ended question and focus group methods to gather information from 20 Malaysian enforcement officers with extensive experience in dealing with terrorism-related activities, as they strive to prevent and counter terrorism incidents. In addition, experienced practitioners and field experts also contributed to the study.

Findings

The study reveals various innovative financial methods used by terrorist-linked organisations to evade detection by local enforcement agencies. These findings are consistent with previous research, which highlights the intelligence of these organisations in avoiding detection by financial regulators.

Research limitations/implications

The findings are based on the perspectives of enforcement officers involved in preventing and countering terrorism activities. Further research could be conducted to gather insights from other government agencies, such as the judiciary or local agencies.

Practical implications

The study offers practical suggestions for organisations and institutions on effectively monitoring and taking appropriate actions in financial activities related to terrorism.

Originality/value

This study provides unique insights into the financial methods of terrorism-related organisations in an emerging country in Southeast Asia. Its findings can be applied throughout the region, given the country’s global connectivity. Furthermore, the study is distinctive in that it provides information from enforcement officers within terrorism-related government organisations, an area where resources are limited. The study also considers the impact of the pandemic on the development of these financial innovations by terrorist organisations.

Details

Journal of Criminological Research, Policy and Practice, vol. 10 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…

Abstract

Purpose

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.

Design/methodology/approach

This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.

Findings

For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.

Originality/value

The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 18 March 2024

Mubarik Abdul Mumin, Ibrahim Osman Adam and Muftawu Dzang Alhassan

This study aims to investigate the influence of information and communication technology (ICT) capabilities on supply chain fraud and sustainability within the context of Ghana’s…

Abstract

Purpose

This study aims to investigate the influence of information and communication technology (ICT) capabilities on supply chain fraud and sustainability within the context of Ghana’s small and medium-sized enterprises (SMEs). Additionally, the research explores the mediating role of supply chain fraud in the relationship between ICT capabilities and supply chain sustainability.

Design/methodology/approach

Data were collected from 102 respondents within Ghana’s SME sector, and the research employed the dynamic capability theory as the conceptual framework. The study utilized partial least squares-structural equation modeling (PLS-SEM) to develop and analyze the proposed model.

Findings

The results of the study reveal a significant reduction in supply chain fraud attributable to enhanced ICT capabilities within Ghanaian SMEs. Moreover, ICT capabilities exert a significant positive influence on supply chain sustainability. Importantly, supply chain fraud emerges as a mediator, elucidating its role at the nexus of supply chain sustainability and ICT capabilities.

Originality/value

This research contributes to the limited body of evidence on the interconnectedness of ICT capabilities, supply chain fraud and supply chain sustainability, particularly within the context of Ghanaian SMEs. Notably, this study pioneers an examination of the mediating impact of supply chain fraud on the relationship between ICT capabilities and supply chain sustainability.

Details

Technological Sustainability, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-1312

Keywords

Article
Publication date: 5 January 2023

Mohd Irwan Abdul Rani, Sharifah Nazatul Faiza Syed Mustapha Nazri and Salwa Zolkaflil

This paper aims to provide a systematic literature review (SLR) on contemporary cardinal money mule issues.

Abstract

Purpose

This paper aims to provide a systematic literature review (SLR) on contemporary cardinal money mule issues.

Design/methodology/approach

This paper reviews the most common money mule themes in perpetrating financial crime activities, especially its roles, recruitment and awareness. A systematic review protocol called preferred reporting items for systematic review and meta-analysis protocols is adopted for this study.

Findings

Money mules are used by organized criminal groups (OCG) or fraudster to launder illicit funds from outrageous criminal activities. They allow their accounts to be used for money laundering by OCG. The attacker, OCG or fraudsters would layer the stolen funds using money mule accounts. These money mules are recruited using various approaches, oftentimes deceived by opulent lifestyles to captivate the interest of potential money mules.

Originality/value

This paper presents money mule awareness needed by accountant, bank employees and the society. It is an unprecedented SLR on money mule. This paper will be beneficial for future money mule researchers, enforcement agencies and practitioners in banking industry.

Details

Journal of Financial Crime, vol. 31 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 8 March 2024

Naveen Naval, Charalampos Alexopoulos, Nina Rizun and Stuti Saxena

While the causes of migration across a range of diverse societies have been studied in the extant literature, a systematic study encapsulating the extant literature pertaining to…

Abstract

Purpose

While the causes of migration across a range of diverse societies have been studied in the extant literature, a systematic study encapsulating the extant literature pertaining to the push and pull factors for the phenomenon of migration has not been conducted so far. The purpose of this study is to present a gist of the push and pull factors that are responsible for migration patterns across different contexts.

Design/methodology/approach

Inferences from the literature review and documentary analysis show that, on the one hand, the push factors for migration entail the enforced reasons like natural causes, wars, health and the like; the pull factors are, by and large, the affirmative ones related to better job opportunities, anticipation of improved well-being, etc.

Findings

It may also be deduced that both the categories of migration causes are analyzed at the individual, group, societal as well as regional levels.

Originality/value

Hitherto, the migration research has focused on understanding the antecedents and consequences of migration in temporal–spatial context, but a syncretic understanding of the push and pull factors behind migration vis-à-vis smart cities is required. The present study seeks to fill this gap. Besides contributing toward the mainstream literature on migration in general, the present study also adds to the literature pertaining to the specific factors responsible for migration patterns.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

1 – 8 of 8