Search results

1 – 4 of 4
Article
Publication date: 9 April 2018

Kofi Koranteng Adu and Emmanuel Adjei

This study aims to investigate the cyber security awareness and policies within corporate organisations in Ghana.

2213

Abstract

Purpose

This study aims to investigate the cyber security awareness and policies within corporate organisations in Ghana.

Design/methodology/approach

Using both quantitative and qualitative approaches underpinned by questionnaire and document analysis, data were collected from 100 participants centred on cyber security awareness and information policies.

Findings

The study underscored that, although corporate organisations had a good knowledge of IT, their awareness of cyber security remains limited. It observed that most organisations in Ghana are not integrating legal aspects into their information security policies. It proposed the need to increase the security awareness of corporate organisation, particularly because of the vulnerabilities they are exposed to.

Research limitations/implications

The implication of the paper with respect to theory, practice and future research lies in the recommendations the authors have proffered, such as the implementation of security awareness training programme, need assessment and the outsourcing of qualified service providers.

Practical implications

The study is useful for policy makers in the management of Ghana’s IT infrastructure.

Originality/value

This study is being undertaken at a period when Ghana has made progressive development and giant steps in the IT industry compared to its counterparts in sub-Saharan Africa. The developed nature of Ghana’s IT infrastructure requires the development of policies for cyber security to prevent data loses and protect the national infrastructure from threats. Undertaking a study on cyber security in an environment where cyber issues are hardly discussed is worthwhile.

Details

foresight, vol. 20 no. 2
Type: Research Article
ISSN: 1463-6689

Keywords

Abstract

Details

Tourism Safety and Security for the Caribbean
Type: Book
ISBN: 978-1-80071-318-5

Article
Publication date: 4 January 2021

Sophia Kaitatzi-Whitlock

In the face of the enormous rise in digital fraud and criminality, resulting in diverse afflictions to millions of user-victims, emanating from users’ horizontal interactive and…

Abstract

Purpose

In the face of the enormous rise in digital fraud and criminality, resulting in diverse afflictions to millions of user-victims, emanating from users’ horizontal interactive and transactive exchanges on the internet, but due significantly to internet’s deregulation and anonymity, this study aims to showcase the need for a socially grounded self-regulation. It holds, that this is feasible and that it can be achieved through large scale, comprehensive digital communication education (DCE) programs.

Design/methodology/approach

The composite methodology of the study comprises four types of components, namely, analytic, exploratory-discursive, constructionist and propositional. The construction-creation element consists of the design of an original combinational research tool: triangular relational pattern (TRP). Through TRPs, researchers can locate the types of relations involved between three implicated entities, namely, the affliction, the culprit and the victim and can study them in-depth. Subsequently, based on the TRP, DCE programs are composed, which are, also, proposed to be deployed by educational authorities and digital civil society associations.

Findings

The created, applied here and proposed TRPs can be used by other researchers aiming to locate, map and analyze the variants of internet criminality and victimhood and their implications across the global frontierless world and in the digital human condition, educational purposes but also to create social cohesion.

Originality/value

The study offers two original contributions. The TRP as a significant relational research tool-grid. The DCE programs that are linked to the repertories of digital relations and can be introduced in the general education programs.

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 14 December 2021

Daniel Dupuis, Deborah Smith and Kimberly Gleason

The purpose of this study is to describe the evolution of fraud schemes with historically conducted with fiat money in physical space to the crypto-assets in digital space as…

1180

Abstract

Purpose

The purpose of this study is to describe the evolution of fraud schemes with historically conducted with fiat money in physical space to the crypto-assets in digital space as follows: ransomware, price manipulation, pump and dump schemes, misrepresentation, spoofing and Ponzi Schemes. To explain how fraud schemes have evolved alongside digital asset markets, this study applies the space transition theory.

Design/methodology/approach

The methodology used is a review of the media regarding six digital asset fraud schemes that have evolved from physical space to virtual space that are currently operational, as well as a review of the literature regarding the space transition theory.

Findings

This paper finds that the digital space and digital assets may facilitate pseudonymous criminal behavior in the present regulatory environment.

Research limitations/implications

The field is rapidly evolving, however this study finds that the conversion from physical to virtual space obfuscates the criminal activity, facilitating anonymity of the perpetrators, and creating new challenges for the legal and regulatory environment.

Practical implications

This paper finds that the digital space and digital assets may facilitate pseudonymous criminal behavior in the present regulatory environment. An understanding of the six crypto-asset fraud schemes described in the paper is useful for anti-financial crime professionals and regulators focusing on deterrence.

Social implications

The space transition theory offers an explanation for why digital space leads criminals to be better positioned to conduct financial crime in virtual space relative to physical space. This offers insights into behavior of digital asset fraudster behavior that could help limit the social damage caused by crypto-asset fraud.

Originality/value

To the authors’ knowledge, this paper is the first to detail the evolution of fraud schemes with fiat money in physical space to their corresponding schemes with digital assets in physical space. This study is also the first to integrate the space transition theory into an analysis of digital asset fraud schemes.

Details

Journal of Financial Crime, vol. 30 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 4 of 4