Search results
1 – 10 of 22Elisma Marais, Jacqui-Lyn McIntyre and Duane Aslett
Corruption is one of the main facilitators of increased wildlife crime in South Africa. It is important to look at the current legislative framework to determine how wildlife…
Abstract
Purpose
Corruption is one of the main facilitators of increased wildlife crime in South Africa. It is important to look at the current legislative framework to determine how wildlife crime can be combated effectively. This paper aims to provide an analysis of the process of wildlife crime, focusing on wildlife poaching and trafficking role players and critically analyses the legislation in place to combat the phenomenon.
Design/methodology/approach
A critical analysis of existing literature such as case law, legislation, peer-reviewed publications and electronic articles was used to identify the legislation and processes for the prevention of wildlife crime in South Africa. Common denominators were identified in these sources to provide a baseline for examining wildlife crime.
Findings
Wildlife criminals rely extensively on corruption during all facets of their trafficking schemes. The use of traditional environmental laws is not effective in dismantling wildlife trafficking networks, as prosecuting those in the upper echelons is often challenging. The extensive reliance on corruption during all facets of wildlife trafficking provides an opportunity for law enforcement to use such corruption crimes as predicate offences in racketeering prosecutions, thus ensuring kingpins find it more difficult to escape prosecution, owing to their involvement in criminal enterprises that sustain themselves through patterns of racketeering.
Originality/value
This paper contributes knowledge to narrow the research gap with regard to wildlife criminals and how they function. It also addresses possibilities to improve prosecution and disrupt wildlife trafficking networks.
Details
Keywords
Soroush Dehghan Salmasi, Mohammadbashir Sedighi, Hossein Sharif and Mahmood Hussain Shah
Traditionally, the banking and financial sectors have pioneered adoption of new technologies and business models. One important digital banking model that has proven its efficacy…
Abstract
Purpose
Traditionally, the banking and financial sectors have pioneered adoption of new technologies and business models. One important digital banking model that has proven its efficacy in recent times, is Digital-Only Banking (DOB) where consumers interact with their banks through digital channels only. Having detailed knowledge of what actually happens at the consumer level during the adoption of new digital models and technologies is paramount to the success of these technological initiatives. The present study aims to investigate DOB adoption behavior and possible barriers using a quantitative approach at the consumer level. A conceptual model is developed by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) model, incorporating Trust (TR), Perceived Risk (PR) constructs and cultural moderators of Individualism (IDV) and Uncertainty Avoidance (UA).
Design/methodology/approach
For this study, an online survey instrument was created and administered in Iran. The research sample was selected through the application of purposive sampling. Data from 788 respondents were analyzed. The proposed model was tested using Partial Least Square.?.s Structural Equation Modeling (PLS-SEM).
Findings
The results show that DOB adoption is positively influenced by Effort Expectancy (EE), Social Influence (SI), and Facilitating Conditions (FC), while PR negatively influences DOB adoption intention. Unexpectedly, the results indicate that TR has no significant impact on DOB usage intention. Additionally, this study demonstrates that with individuals having a low level of IDV, the relationship between PE and BI is stronger, and with individuals having a low level of UA, the impact of SI on BI is stronger. It also reveals that the impact of TR on BI is stronger in low individualistic cultures.
Practical implications
DOB providers should enhance support features of their services or provide facilities that make it simpler for users to accomplish online transactions. Here, in order to improve the UI/UX design of their apps, DOB product managers should carefully observe the technical guidelines of the operating systems of digital devices, such as the Human Interface Guidelines (HIG) for iOS and Material You for Android. Additionally, DOB providers should build partnerships with mega online retailers to provide hassle-free and easy to use payment solutions for consumers.
Originality/value
DOB, as a novel and business model, has been investigated in very few studies, especially regarding any which focus on its adoption. To fill this gap, this research investigates DOB adoption through a modified version of the UTAUT model. The findings of this study suggest that future research regarding DOB should consider sources of TR, types of non-adopters, and context. This study, as the first of its kind in DOB literature, also highlights the significant role played by cultural values in customer behavior regarding DOB adoption.
Details
Keywords
Neha Chhabra Roy and Sreeleakha P.
This study addresses the ever-increasing cyber risks confronting the global banking sector, particularly in India, amid rapid technological advancements. The purpose of this study…
Abstract
Purpose
This study addresses the ever-increasing cyber risks confronting the global banking sector, particularly in India, amid rapid technological advancements. The purpose of this study is to de velop an innovative cyber fraud (CF) response system that effectively controls cyber threats, prioritizes fraud, detects early warning signs (EWS) and suggests mitigation measures.
Design/methodology/approach
The methodology involves a detailed literature review on fraud identification, assessment methods, prevention techniques and a theoretical model for fraud prevention. Machine learning-based data analysis, using self-organizing maps, is used to assess the severity of CF dynamically and in real-time.
Findings
Findings reveal the multifaceted nature of CF, emphasizing the need for tailored control measures and a shift from reactive to proactive mitigation. The study introduces a paradigm shift by viewing each CF as a unique “fraud event,” incorporating EWS as a proactive intervention. This innovative approach distinguishes the study, allowing for the efficient prioritization of CFs.
Practical implications
The practical implications of such a study lie in its potential to enhance the banking sector’s resilience to cyber threats, safeguarding stability, reputation and overall risk management.
Originality/value
The originality stems from proposing a comprehensive framework that combines machine learning, EWS and a proactive mitigation model, addressing critical gaps in existing cyber security systems.
Details
Keywords
Sri Lestari, Wiwiek Rabiatul Adawiyah, Arina Laksita Alhamidi, Joni Prayogi and Ronald Haryanto
The purpose of this study was to examine the relationship between online banking fraud experience and fear of cybercrime and distrust of online banking services, and to understand…
Abstract
Purpose
The purpose of this study was to examine the relationship between online banking fraud experience and fear of cybercrime and distrust of online banking services, and to understand how perceived usefulness of online banking moderates the relationship.
Design/methodology/approach
The number of respondents involved in this study was 271 people from the Central Java region, Indonesia. Statistical analysis was performed using Jeffreys’s Amazing Statistics Program software to examine the relationships and interactions between the variables studied.
Findings
Experience of online banking fraud is positively related to fear of cybercrime and distrust of online banking services. Perceived usefulness of online banking moderates the relationship between online banking fraud experience and fear of cybercrime and distrust of digital payments. Perceived usefulness is negatively related to the level of distrust of online banking services.
Research limitations/implications
Overall, the implications of this study underscore the importance of dealing with the risks of cybercrime in online banking services. By focusing on security, user awareness and the role of perceived usefulness, banking service providers can create a safer and more trusting environment for users of online banking services. This also contributes to the development of more innovative services and can increase customer satisfaction and trust.
Practical implications
The practical application of these findings is important for financial institutions and online banking service providers. Companies must improve cybersecurity with the latest technology and provide education about online security practices. Transparent communication and better customer service will help overcome customer fears. Compliance with security regulations and technological innovation is also important to protect online banking services. With these steps, customer security and trust can be improved, and the adoption of online banking services will increase widely.
Social implications
The social implications of this research are increasing public awareness about cybersecurity, consumer protection and strengthening trust in online banking services. With joint efforts, a safer and more trusting environment in using online banking services can be realized.
Originality/value
The originality of this research lies in the use of perceived usefulness of online banking as a moderating variable to reduce the negative impact of online banking fraud experience. With a focus on the psychological effects of customers experiencing fraud, this research seeks to rebuild trust and improve the security of online banking services.
Details
Keywords
Lucía Rey-Ares, Sara Fernández-López and Marcos Álvarez-Espiño
The ongoing evolution of the Internet and the subsequent digitalisation of financial services, along with the ever-increasing innovation of financial products, have rendered…
Abstract
Purpose
The ongoing evolution of the Internet and the subsequent digitalisation of financial services, along with the ever-increasing innovation of financial products, have rendered consumers more vulnerable to a wider range of fraud in the banking sector and, particularly, to consumer financial fraud (CFF). This paper aims to analyse the factors that may contribute to CFF exposure and victimisation among Spaniards, with a special focus on financial literacy.
Design/methodology/approach
This paper provides a comprehensive overview of leading publications on the topic, followed by empirical analyses using regression models with a sample of 6,207 Spanish individuals drawn from the Survey of Financial Competences.
Findings
Objective and subjective financial knowledge are positively correlated with CFF exposure via email but do not protect against CFF victimisation. Similarly, financial knowledge overconfidence is positively related to the former but fails to constitute a driver of the latter. Financial inclusion, measured by the number of financial products held, not only increases the risk of this exposure but also contributes to its subsequent victimisation.
Originality/value
To the best of the authors' knowledge, no previous paper has analysed the relationship between CFF and financial literacy by differentiating two types of vulnerabilities to fraud (exposure and victimisation) while considering different constructs of financial literacy. Dissecting these two domains may explain why the same financial literacy construct can have different effects at both stages of financial fraud and, furthermore, how different financial literacy constructs may affect the same stage of financial fraud.
Details
Keywords
Marcus Felson and Daniel Reinhard
A growing literature emphasizes violence occurring in public places. Yet, police seldom report such violence separately from violent incidents occurring elsewhere. This paper aims…
Abstract
Purpose
A growing literature emphasizes violence occurring in public places. Yet, police seldom report such violence separately from violent incidents occurring elsewhere. This paper aims to distinguish assaults that occur in public vs private, outdoors vs indoors and in homes vs the night-time economy.
Design/methodology/approach
The authors reorganize police data to classify 1,062 assault locations for Boulder, Colorado, USA, 2020–2021, providing basic descriptive statistics that are seldom calculated or published.
Findings
In this city, almost two-thirds of police-recorded assaults occur away from home, often within night-time economy zones. Almost half of police-recorded assaults occur outdoors.
Research limitations/implications
Public assaults are probably under-reported and under-recorded in police data. The share of assaults occurring in public is likely to vary greatly among cities, along with reporting practices.
Practical implications
Public assaults can create special problems for police and social services. Poor management of public space can contribute to such violence. Alcohol policy and enforcement in public places is especially relevant to public assaults. Poor urban design might explain some of the problem.
Social implications
Public assaults are seen by many people and may do extra harm to children and even adults.
Originality/value
Police reports and academic work based on them seldom distinguish public from private assaults and seldom enumerate outdoor assaults in comparison to those indoors. In addition, statistics estimating violence in the night-time economy might not compare risks to other settings.
Details
Keywords
Samantha A. Conroy and John W. Morton
Organizational scholars studying compensation often place an emphasis on certain employee groups (e.g., executives). Missing from this discussion is research on the compensation…
Abstract
Organizational scholars studying compensation often place an emphasis on certain employee groups (e.g., executives). Missing from this discussion is research on the compensation systems for low-wage jobs. In this review, the authors argue that workers in low-wage jobs represent a unique employment group in their understanding of rent allocation in organizations. The authors address the design of compensation strategies in organizations that lead to different outcomes for workers in low-wage jobs versus other workers. Drawing on and integrating human resource management (HRM), inequality, and worker literatures with compensation literature, the authors describe and explain compensation systems for low-wage work. The authors start by examining workers in low-wage work to identify aspects of these workers’ jobs and lives that can influence their health, performance, and other organizationally relevant outcomes. Next, the authors explore the compensation systems common for this type of work, building on the compensation literature, by identifying the low-wage work compensation designs, proposing the likely explanations for why organizations craft these designs, and describing the worker and organizational outcomes of these designs. The authors conclude with suggestions for future research in this growing field and explore how organizations may benefit by rethinking their approach to compensation for low-wage work. In sum, the authors hope that this review will be a foundational work for those interested in investigating organizational compensation issues at the intersection of inequality and worker and organizational outcomes.
Details
Keywords
Kathrin Mayr and Christoph Teller
Unacceptable behaviour in retailing – negative customer deviance (NCD) is rising, damaging retailers financially. Current research investigates forms of NCD by addressing its…
Abstract
Purpose
Unacceptable behaviour in retailing – negative customer deviance (NCD) is rising, damaging retailers financially. Current research investigates forms of NCD by addressing its impact on employees but overlooks its effects on bystander-customers and their retail channel preferences. As channel switching within retailing is increasing unprecedentedly, this research investigates its correspondence with NCD encounters.
Design/methodology/approach
This research uses structural equation modelling, based on data collection administered through a web-based survey of 1,008 customers of at least 16 years of age, to analyse the research model.
Findings
The findings reveal unexplored forms of NCD perceived by bystander-customers in retailing and their consequences, linking it to bystander-customers' ill-being, dissatisfaction with the shopping experience, a decrease in store commitment and an increase in their retail channel-switching intentions. Additionally, the research uncovers moderating variables.
Practical implications
This research tests NCD dimensions and effects on bystander-customers, which indicate the need for retailers to address shopping values, attitudes and commitment through corrective, proactive and long-term strategic actions.
Originality/value
As one of the first studies to investigate the impact of NCD on bystander-customers' intentions to switch from store-based to online shopping, strategies for retailers are developed to help diminish and control NCD-induced threats to bystander-customers.
Details
Keywords
Hendro Margono, Muhammad Saud and Asia Ashfaq
Social media provides a platform for people to connect, communicate and share their opinions, and has become a powerful gizmo for freedom of expression as well as freedom of…
Abstract
Purpose
Social media provides a platform for people to connect, communicate and share their opinions, and has become a powerful gizmo for freedom of expression as well as freedom of speech. The present study intends to examine the role of social media in instigating hateful thoughts, actions among youth and eventually leading them towards hate speech.
Design/methodology/approach
Mixed methods were adopted to achieve the objectives, where survey (quantitative) and focus group discussions (qualitative) were carried out. The students who participated were from different universities, campuses and faith-based schools in Indonesia. They were recruited through online and offline sources where they showed their interest in participating in this study. Participants were 19–30 years old. Data was analysed by deploying the narrations, thematic (based on themes), and univariate analysis.
Findings
In the present research, three attributes of hate speech were investigated, such as form of expression, discrimination and identity factors. The findings of the study show that the prevalence of hate speech among youth in Indonesia is associated with their belongingness to political ideology, identity, nationality and ethnicity.
Social implications
The objective is to examine the prevalence and nature of hate speech among youth in Indonesia, identify the factors and reasons for engaging in hate speech and assess the potential impacts of hate speech.
Originality/value
This research attempts to analyse the role of social media in shaping the mindset of the youth towards hate speech, which ultimately leads to delinquency.
Details