Search results

1 – 10 of 126
Article
Publication date: 1 January 2024

Keshnee Padayachee

This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale…

Abstract

Purpose

This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study. This paper aims to present the preliminary findings of an investigation that explored the constructs of personality traits and situational crime prevention theory (SCPT) as antecedents to social cognitive determinants (attitude, perceived behavioural control and subjective norms using the theory of planned behaviour [TPB] framing) and how these elements subsequently estimate compliant information security behaviour. Moreover, this paper delves into the contrasting influences of light and dark personality traits on insider information security compliance.

Design/methodology/approach

A cross-sectional survey was conducted to study SCPT measures and the personality factors dyad using a diverse but limited sample (n = 82).

Findings

There were ten significant direct relationships between SCPT factors and personality traits related to the components of the TPB. Seventeen hypotheses were not supported. However, these findings highlight the complexity of the topic under study.

Practical implications

Understanding individual differences within the compliance model could be used for custom training protocols, employee selection, assignment and specific types of information security interventions.

Originality/value

There is a scarcity of studies considering the effects of situational and personality factors, specifically the dark versus light triad of personality traits within the information security domain. Therefore, this preliminary result provides early insight that could guide further studies. This research could have important implications for organisations at risk of insider attacks.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Abstract

Details

The First British Crime Survey
Type: Book
ISBN: 978-1-80382-275-4

Article
Publication date: 29 September 2021

Nicholas Gilmour

This paper aims to demonstrate the benefit of applying crime script analysis at a macro level to expose money laundering as an interconnected series of events that contradict…

Abstract

Purpose

This paper aims to demonstrate the benefit of applying crime script analysis at a macro level to expose money laundering as an interconnected series of events that contradict understanding which defines money laundering as a series of typological studies.

Design/methodology/approach

Using previously captured data and detailed research studies alongside the professional experience of the author, this study creates a horizontal crime script for three distinct methods of money laundering – to determine characteristic nodes and identify pathways.

Findings

Despite significant research into money laundering typologies, this paper demonstrates that the process of money laundering cannot be separated into typological studies. By applying crime script analysis to each method of money laundering prior to analysing the nodes, activities and behaviours, money laundering can be identified as a series of interconnected services, business formalities and management activities.

Practical implications

This study is of value to government policymakers, regulators and financial institutions considering future preventative measures. It is also of value to financial investigators and law enforcement agencies intent on investigating money laundering. By applying the method of analysis outlined in this paper to each method of money laundering and then combining them together, it is possible to understand money laundering as a holistic process, in which webs of interconnected criminal events can be identified for investigative and preventative purposes.

Originality/value

Interest in crime script analysis is now supporting understanding of different crime types. This study goes beyond the analysis of individual types of money laundering and applies it in a “test format” against three methods of money laundering to create, for the first time, a holistic or macro appreciation of the interconnected series of events, activities and behaviours which exist beyond the characteristics routinely captured in money laundering typology reports.

Article
Publication date: 27 September 2023

Elvis Attakora-Amaniampong

There is a robust study on crime prevention through environmental design (CPTED) in student housing nowadays, but has a limited utilization of weight-of-evidence (W-o-E) approach…

Abstract

Purpose

There is a robust study on crime prevention through environmental design (CPTED) in student housing nowadays, but has a limited utilization of weight-of-evidence (W-o-E) approach. This study aims to assess the extent of CPTED in student housing facilities of universities in Ghana.

Design/methodology/approach

Using the on-campus student housing facilities of both private and public universities, the study adopted W-o-E approach that integrates two postoccupancy evaluations from end-users and student housing managers. In addition, observation by professionals as the lines of evidence (LoE) was also adopted. Weighted median was used to normalise the LoE into a W-o-E as the CPTED value in the student housing facilities.

Findings

The study uncovered low CPTED in the student housing facilities. Maintenance was identified as the leading CPTED principle present in the student housing facilities.

Practical implications

The study has given the extent of CPTED in students’ housing, an important insight for university students’ housing management. This can serve as a policy alert for the university students’ housing management to adopt building designs that enhance CPTED and the safety of the youth.

Originality/value

This study is different from other CPTED and students’ housing studies commonly situated in the Euro-America context. The study exceptionally applied the use of W-o-E in students’ housing in assessing the extent of CPTED in student housing within the context of sub-Saharan African universities.

Details

Safer Communities, vol. 23 no. 1
Type: Research Article
ISSN: 1757-8043

Keywords

Content available
Book part
Publication date: 23 August 2023

Julian Molina

Abstract

Details

The First British Crime Survey
Type: Book
ISBN: 978-1-80382-275-4

Article
Publication date: 11 September 2023

Usman Adekunle Ojedokun, Olufikayo K. Oyelade, Adebimpe A. Adenugba and Olajide O. Akanji

Banditry is a major social problem in Nigeria that has over time defied series of intervention measures introduced by the federal and state governments to address it. Therefore…

Abstract

Purpose

Banditry is a major social problem in Nigeria that has over time defied series of intervention measures introduced by the federal and state governments to address it. Therefore, this study aims to investigate the counter-banditry strategies of the affected communities in Oyo State, Nigeria.

Design/methodology/approach

The research was exploratory and cross-sectional in design. Situational criminal prevention theory was used as conceptual guide. Data were elicited from community leaders, community members and local security guards using in-depth interview, key-informant interview and focus group discussion methods.

Findings

The results showed that communities affected by banditry problem were adopting different internal and external interventions to combat the criminal act. Although the counter-banditry strategies of the affected communities have brought about a reduction in the occurrence of the criminal act, the problem is yet to be totally eliminated as people still get victimised.

Originality/value

This research expanded the frontiers of knowledge by focusing on the counter-banditry strategies of the communities affected by the problem of banditry and also suggested relevant practical steps that can be taken to further strengthen the existing security architectures in such locations.

Details

Safer Communities, vol. 23 no. 1
Type: Research Article
ISSN: 1757-8043

Keywords

Book part
Publication date: 23 August 2023

Julian Molina

Abstract

Details

The First British Crime Survey
Type: Book
ISBN: 978-1-80382-275-4

Content available
Book part
Publication date: 23 August 2023

Julian Molina

Abstract

Details

The First British Crime Survey
Type: Book
ISBN: 978-1-80382-275-4

Abstract

Details

The First British Crime Survey
Type: Book
ISBN: 978-1-80382-275-4

Article
Publication date: 27 September 2023

Sharon Wilson, Nor Azlili Hassan, Kheng Kia Khor, Santhidran Sinnappan, Afi Roshezry Abu Bakar and Soon Aun Tan

Scams are indeed malicious attempts to influence people and can take many forms, including online scams. With the increasing availability of technology, scammers have more tools…

Abstract

Purpose

Scams are indeed malicious attempts to influence people and can take many forms, including online scams. With the increasing availability of technology, scammers have more tools at their disposal to create convincing and sophisticated communications that appear to come from legitimate sources, such as emails, text messages or social media posts. These scams can be designed to trick individuals into clicking on malicious links, downloading malware or ransomware or providing sensitive information such as login information, financial information or personal details. Scammers often use social engineering techniques to persuade their targets to take specific actions, such as creating a sense of urgency, offering a reward or prize or posing as a trusted authority. These tactics can be highly effective, particularly if the target is unaware of the warning signs of a scam or is unfamiliar with how to protect themselves from online fraud. This paper aims to explore the extent and nature of this problem and evokes the concern that the general public is vulnerable and susceptible to scams if they are not resilient and aware. This paper also explores why victims fall for online scams and uncovers preventive measures to enable a direction in tacitly strategizing ways to create more impactful and effective awareness campaigns.

Design/methodology/approach

This study explores these aspects through a holistic qualitative approach. Using in-depth interview techniques with six victims, six non-victims, four law enforcement officers, four scammers and seven stakeholders from various agencies such as banks, telecommunication agencies and the Malaysian Communications and Multimedia Commission involved in combating the issue of scams.

Findings

The findings generally revealed that participants who were victims of scams felt Malaysians were susceptible to scams, easily fooled and had a nonchalant attitude. Most participants also highlighted that public safety is important for ensuring a high quality of life for citizens that should work closely between the government and non-government agencies, including effective law enforcement and crime prevention strategies.

Originality/value

The uniqueness of this study is the feedback from scammers themselves and their input towards authority and victims. Overall, the respondents provide their views drawing strength from the ever-changing technological background as well as the susceptibility of security features and vulnerability of human engagement.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of 126