Search results
1 – 10 of 126This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale…
Abstract
Purpose
This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study. This paper aims to present the preliminary findings of an investigation that explored the constructs of personality traits and situational crime prevention theory (SCPT) as antecedents to social cognitive determinants (attitude, perceived behavioural control and subjective norms using the theory of planned behaviour [TPB] framing) and how these elements subsequently estimate compliant information security behaviour. Moreover, this paper delves into the contrasting influences of light and dark personality traits on insider information security compliance.
Design/methodology/approach
A cross-sectional survey was conducted to study SCPT measures and the personality factors dyad using a diverse but limited sample (n = 82).
Findings
There were ten significant direct relationships between SCPT factors and personality traits related to the components of the TPB. Seventeen hypotheses were not supported. However, these findings highlight the complexity of the topic under study.
Practical implications
Understanding individual differences within the compliance model could be used for custom training protocols, employee selection, assignment and specific types of information security interventions.
Originality/value
There is a scarcity of studies considering the effects of situational and personality factors, specifically the dark versus light triad of personality traits within the information security domain. Therefore, this preliminary result provides early insight that could guide further studies. This research could have important implications for organisations at risk of insider attacks.
Details
Keywords
This paper aims to demonstrate the benefit of applying crime script analysis at a macro level to expose money laundering as an interconnected series of events that contradict…
Abstract
Purpose
This paper aims to demonstrate the benefit of applying crime script analysis at a macro level to expose money laundering as an interconnected series of events that contradict understanding which defines money laundering as a series of typological studies.
Design/methodology/approach
Using previously captured data and detailed research studies alongside the professional experience of the author, this study creates a horizontal crime script for three distinct methods of money laundering – to determine characteristic nodes and identify pathways.
Findings
Despite significant research into money laundering typologies, this paper demonstrates that the process of money laundering cannot be separated into typological studies. By applying crime script analysis to each method of money laundering prior to analysing the nodes, activities and behaviours, money laundering can be identified as a series of interconnected services, business formalities and management activities.
Practical implications
This study is of value to government policymakers, regulators and financial institutions considering future preventative measures. It is also of value to financial investigators and law enforcement agencies intent on investigating money laundering. By applying the method of analysis outlined in this paper to each method of money laundering and then combining them together, it is possible to understand money laundering as a holistic process, in which webs of interconnected criminal events can be identified for investigative and preventative purposes.
Originality/value
Interest in crime script analysis is now supporting understanding of different crime types. This study goes beyond the analysis of individual types of money laundering and applies it in a “test format” against three methods of money laundering to create, for the first time, a holistic or macro appreciation of the interconnected series of events, activities and behaviours which exist beyond the characteristics routinely captured in money laundering typology reports.
Details
Keywords
There is a robust study on crime prevention through environmental design (CPTED) in student housing nowadays, but has a limited utilization of weight-of-evidence (W-o-E) approach…
Abstract
Purpose
There is a robust study on crime prevention through environmental design (CPTED) in student housing nowadays, but has a limited utilization of weight-of-evidence (W-o-E) approach. This study aims to assess the extent of CPTED in student housing facilities of universities in Ghana.
Design/methodology/approach
Using the on-campus student housing facilities of both private and public universities, the study adopted W-o-E approach that integrates two postoccupancy evaluations from end-users and student housing managers. In addition, observation by professionals as the lines of evidence (LoE) was also adopted. Weighted median was used to normalise the LoE into a W-o-E as the CPTED value in the student housing facilities.
Findings
The study uncovered low CPTED in the student housing facilities. Maintenance was identified as the leading CPTED principle present in the student housing facilities.
Practical implications
The study has given the extent of CPTED in students’ housing, an important insight for university students’ housing management. This can serve as a policy alert for the university students’ housing management to adopt building designs that enhance CPTED and the safety of the youth.
Originality/value
This study is different from other CPTED and students’ housing studies commonly situated in the Euro-America context. The study exceptionally applied the use of W-o-E in students’ housing in assessing the extent of CPTED in student housing within the context of sub-Saharan African universities.
Details
Keywords
Usman Adekunle Ojedokun, Olufikayo K. Oyelade, Adebimpe A. Adenugba and Olajide O. Akanji
Banditry is a major social problem in Nigeria that has over time defied series of intervention measures introduced by the federal and state governments to address it. Therefore…
Abstract
Purpose
Banditry is a major social problem in Nigeria that has over time defied series of intervention measures introduced by the federal and state governments to address it. Therefore, this study aims to investigate the counter-banditry strategies of the affected communities in Oyo State, Nigeria.
Design/methodology/approach
The research was exploratory and cross-sectional in design. Situational criminal prevention theory was used as conceptual guide. Data were elicited from community leaders, community members and local security guards using in-depth interview, key-informant interview and focus group discussion methods.
Findings
The results showed that communities affected by banditry problem were adopting different internal and external interventions to combat the criminal act. Although the counter-banditry strategies of the affected communities have brought about a reduction in the occurrence of the criminal act, the problem is yet to be totally eliminated as people still get victimised.
Originality/value
This research expanded the frontiers of knowledge by focusing on the counter-banditry strategies of the communities affected by the problem of banditry and also suggested relevant practical steps that can be taken to further strengthen the existing security architectures in such locations.
Details
Keywords
Sharon Wilson, Nor Azlili Hassan, Kheng Kia Khor, Santhidran Sinnappan, Afi Roshezry Abu Bakar and Soon Aun Tan
Scams are indeed malicious attempts to influence people and can take many forms, including online scams. With the increasing availability of technology, scammers have more tools…
Abstract
Purpose
Scams are indeed malicious attempts to influence people and can take many forms, including online scams. With the increasing availability of technology, scammers have more tools at their disposal to create convincing and sophisticated communications that appear to come from legitimate sources, such as emails, text messages or social media posts. These scams can be designed to trick individuals into clicking on malicious links, downloading malware or ransomware or providing sensitive information such as login information, financial information or personal details. Scammers often use social engineering techniques to persuade their targets to take specific actions, such as creating a sense of urgency, offering a reward or prize or posing as a trusted authority. These tactics can be highly effective, particularly if the target is unaware of the warning signs of a scam or is unfamiliar with how to protect themselves from online fraud. This paper aims to explore the extent and nature of this problem and evokes the concern that the general public is vulnerable and susceptible to scams if they are not resilient and aware. This paper also explores why victims fall for online scams and uncovers preventive measures to enable a direction in tacitly strategizing ways to create more impactful and effective awareness campaigns.
Design/methodology/approach
This study explores these aspects through a holistic qualitative approach. Using in-depth interview techniques with six victims, six non-victims, four law enforcement officers, four scammers and seven stakeholders from various agencies such as banks, telecommunication agencies and the Malaysian Communications and Multimedia Commission involved in combating the issue of scams.
Findings
The findings generally revealed that participants who were victims of scams felt Malaysians were susceptible to scams, easily fooled and had a nonchalant attitude. Most participants also highlighted that public safety is important for ensuring a high quality of life for citizens that should work closely between the government and non-government agencies, including effective law enforcement and crime prevention strategies.
Originality/value
The uniqueness of this study is the feedback from scammers themselves and their input towards authority and victims. Overall, the respondents provide their views drawing strength from the ever-changing technological background as well as the susceptibility of security features and vulnerability of human engagement.
Details