Search results

1 – 10 of over 1000
Article
Publication date: 30 August 2021

Benjamin K. Ngugi, Kuo-Ting Hung and Yuanxiang John Li

Tax Identity Theft involves the illegal use of a potential taxpayer’s identity, usually the social security number, to fraudulently file a tax return and claim a refund. The…

Abstract

Purpose

Tax Identity Theft involves the illegal use of a potential taxpayer’s identity, usually the social security number, to fraudulently file a tax return and claim a refund. The victim is the real owner of the social security number who will have difficulties getting a tax refund, as the offender has already taken a refund for the year in question. This paper aims to investigate whether the increased use and adoption of electronic tax filing (i.e. E-Filing) technologies has inadvertently resulted in a corresponding growth in Tax Identity Theft.

Design/methodology/approach

Multiple regressions are used to analyze the data that is extracted from the Identity Theft complaint reports (maintained by the Federal Trade Commission) and the tax filing statistics (retrieved from the Internal Revenue Service).

Findings

The results indicate that E-Filing can indirectly but significantly increase Tax Identity Theft through the full mediation effects of individual Self-E-Filing and Direct Deposit adoption, after controlling for general Identity Theft, the number of Individual Tax Returns and Total Refunds.

Originality/value

The authors explore the association between the adoption of tax e-filing technologies and Tax Identity Theft. The findings suggest that the key loopholes in the Tax Identity Theft process are at the Self-E-Filing and the Direct Deposit points. Several practical recommendations for patching these loopholes are provided and discussed.

Details

Information & Computer Security, vol. 30 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 23 July 2019

Mark J. Nigrini and William Karstens

This paper develops a vector variation score that quantifies the change in an array of data points from period-to-period. The array could be the amounts reported on an income tax

Abstract

Purpose

This paper develops a vector variation score that quantifies the change in an array of data points from period-to-period. The array could be the amounts reported on an income tax return, the closing stock prices for a set of listed companies, the monthly sales amounts for retail locations or the monthly balances in general ledger accounts.

Design/methodology/approach

The score is grounded in analytic geometry. The angle θ measures whether the changes were uniformly spread across the line items. The item(s) with the largest contribution(s) to the score can be identified. Line items can be weighted such that they contribute less than fully to the score.

Findings

The method can identify tax returns with large year-on-year changes. The method can identify the fact that the price movements during earnings season are less dependent than is usually the case. The method can identify anomalies in reported sales amounts. The method should be able to identify ledger accounts’ large abnormal changes.

Research limitations/implications

Auditors will need to be trained to interpret the results and to reduce the number of false positives.

Practical implications

The score could be used in both external and internal audit applications where auditors want to quantify and rank period-on-period changes in a search for outliers.

Originality/value

The change score is normalized to the [0, 1] range. The results can be plotted as a polar plot for display on an auditing dashboard. The contribution of a single line item can be calculated and line items can be weighted to prevent them from having an undue influence on the results.

Details

Managerial Auditing Journal, vol. 36 no. 1
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 11 October 2011

Olatunde Julius Otusanya

Contemporary literature has paid scholarly attention to corruption from a variety of competing perspectives. However, broader accounts of the impact of corruption on development…

6750

Abstract

Purpose

Contemporary literature has paid scholarly attention to corruption from a variety of competing perspectives. However, broader accounts of the impact of corruption on development in developing countries are relatively scarce. The purpose of this paper is to examine the effect of corruption as a social impediment to development, which has a devastating effect on developing countries.

Design/methodology/approach

The paper explores the relevant literature and the different perspectives that have been developed and conducted for investigating corruption in developing countries. The paper uses publicly available evidence to show that political, economic elite engaged in corrupt practices.

Findings

The evidence shows that socio‐political and economic development, politics, power, history and globalisation have continued to reproduce and transform the institutional structures and actors which have facilitated corrupt practices in developing countries. The review shows that large sums of government revenue have been undermined by the corrupt practices of the political and economic elite (both local and international), which have enriched a few, but impoverished most.

Practical implications

The paper seeks to bring the anti‐social activities of political, economic and professionals under scrutiny and offers some suggestions for reforms.

Social implications

Corruption has played a major role in causing serious damage to the economic and social landscape in developing countries. This in turn, has undermined social welfare and also investment in the public services, thereby eroding the quality of life and producing a decline in average life expectancy.

Originality/value

The paper is a general review of literature and evidence on contemporary issues.

Details

Journal of Money Laundering Control, vol. 14 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 January 2012

Shima D. Keene

The purpose of this paper is to highlight emerging threats in cyberspace, with particular reference to financial crime in the virtual world, which have real life implications, as…

4351

Abstract

Purpose

The purpose of this paper is to highlight emerging threats in cyberspace, with particular reference to financial crime in the virtual world, which have real life implications, as well as to recommend ways in which the threat may be mitigated.

Design/methodology/approach

The methodology adopted consisted of an extensive literature review on topics to include cyber crime, virtual worlds, and financial crime.

Findings

Virtual worlds such as Second Life play a key role in supporting real world activities such as education, training and business and as such, should not be dismissed purely as a “gaming” environment. In addition, emerging technologies coupled with the lack of legislation and regulation within virtual worlds has created an environment where a variety of crimes can be committed without fear of detection or prosecution. A further concern is its use by criminals as a vehicle to mask real life crimes such as fraud, identify theft and money laundering. The question is to what extent the blurring of the virtual and real life environments can be clarified in order to minimise the risk of abuse of virtual environments by criminal elements, which have direct consequences in the real world.

Originality/value

This paper serves as a useful guide to alert and educate security professionals, the judiciary, law enforcement and policy makers of the significance and the extent of the use of “virtual” environments in cyberspace for criminal means, such as fraud and money laundering. Findings are supported by a conclusion which includes recommendations for tackling these issues.

Details

Journal of Money Laundering Control, vol. 15 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 4 May 2012

Olatunde Julius Otusanya

Contemporary literature has paid scholarly attention to financial criminal practice from a variety of competing perspectives. However, this paper seeks to encourage reflections on…

1344

Abstract

Purpose

Contemporary literature has paid scholarly attention to financial criminal practice from a variety of competing perspectives. However, this paper seeks to encourage reflections on some questionable practices of the political and economic elite which increase their capital accumulation but harm citizens.

Design/methodology/approach

Within a socio‐political framework, this study adopts the theories of the developmental state and globalisation in order to understand the relationship between social agency and society, and focuses on the institutional structures and the role of social actors.

Findings

The paper used publicly available documents to construct case studies to provide some evidence of the strategies and tactics used by political elite to facilitate their capital accumulations. Evidence is provided to show that large sums of government revenue have been undermined by the financial criminal practices of the Nigerian political and economic elite (both local and international), which have enriched a few, but impoverished most, Nigerians.

Practical implications

Financial criminal practices have played a major role in causing serious damage to the economic and social landscape of Nigeria, which in turn, has undermined social welfare and also investment in the public services, thereby eroding the quality of life and producing a decline in average life expectancy. As a consequence of recurring corrupt practices by the political and economic elites in Nigeria, there is a need for reform in order to curb the practice which has had and continues to have, a serious effect on Nigeria and its future development.

Originality/value

Broader accounts of the impact of financial criminal practices on development in developing countries are relatively scarce. Previous studies have tended to individualise the problem.

Details

Journal of Financial Crime, vol. 19 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 13 March 2009

Ranjit Bose

Advanced analytics‐driven data analyses allow enterprises to have a complete or “360 degrees” view of their operations and customers. The insight that they gain from such analyses…

13572

Abstract

Purpose

Advanced analytics‐driven data analyses allow enterprises to have a complete or “360 degrees” view of their operations and customers. The insight that they gain from such analyses is then used to direct, optimize, and automate their decision making to successfully achieve their organizational goals. Data, text, and web mining technologies are some of the key contributors to making advanced analytics possible. This paper aims to investigate these three mining technologies in terms of how they are used and the issues that are related to their effective implementation and management within the broader context of predictive or advanced analytics.

Design/methodology/approach

A range of recently published research literature on business intelligence (BI); predictive analytics; and data, text and web mining is reviewed to explore their current state, issues and challenges learned from their practice.

Findings

The findings are reported in two parts. The first part discusses a framework for BI using the data, text, and web mining technologies for advanced analytics; and the second part identifies and discusses the opportunities and challenges the business managers dealing with these technologies face for gaining competitive advantages for their businesses.

Originality/value

The study findings are intended to assist business managers to effectively understand the issues and emerging technologies behind advanced analytics implementation.

Details

Industrial Management & Data Systems, vol. 109 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 11 October 2011

Chad Albrecht, Conan Albrecht and Shay Tzafrir

The purpose of this paper is to present and explain the identity theft cycle. The identity theft cycle explains how a perpetrator goes through various stages of confidence and…

3232

Abstract

Purpose

The purpose of this paper is to present and explain the identity theft cycle. The identity theft cycle explains how a perpetrator goes through various stages of confidence and experimentation when stealing an individual's identity.

Design/methodology/approach

The paper takes a conceptual approach by first describing identity theft in detail and then discussing the seriousness of identity theft for consumers today. The paper then presents and explains the identity theft cycle in greater detail including the stages of discovery, action, and trial.

Findings

The paper provides evidence to suggest that if identity theft is detected early, consumers can protect themselves from the vast and difficult consequences of identity theft.

Originality/value

This paper fulfills an important area of research by providing basic information about the nature of identity theft. This paper also discusses the various ways that perpetrators steal consumers' information, as well as teaches consumers how to proactively protect themselves from identity theft.

Details

Journal of Financial Crime, vol. 18 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 11 May 2023

Alexander Joseph Vanhee and Rachel McNealey

The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate…

Abstract

Purpose

The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate whether aspects of an individual’s residence affect their likelihood of becoming identity theft victims.

Design/methodology/approach

The authors conduct logistic regressions of whether a respondent was an identity theft victim in the past year using the following variables as key predictors: number of housing units in a residence, whether the respondent operates a business out of their residence and if residence access is restricted.

Findings

The results suggest that location influences the likelihood of identity theft to a modest degree though some aspects of location (possibly those related to rewards perceptions) may be more relevant than others. Meanwhile, though location may influence initial target selection, whether someone is victimized may be more dependent on factors such as personal behavior.

Originality/value

To the best of the authors’ knowledge, this manuscript represents one of the first investigations into the relationship between microlevel place and the incidence of identity theft. Furthermore, it provides evidence that one does exist which bears further inquiry.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 12 October 2010

Petter Gottschalk

The purpose of this paper is to present a systematic approach to classify financial crime into main categories as well as sub categories.

8131

Abstract

Purpose

The purpose of this paper is to present a systematic approach to classify financial crime into main categories as well as sub categories.

Design/methodology/approach

Based on a literature review, the main four categories were labeled corruption, fraud, theft, and manipulation, respectively.

Findings

There is a massive variety of crime types and crime names in the literature that can successfully be allocated to main categories of financial crime.

Research limitations/implications

The paper is based on exploratory research to stimulate future research in refining and improving the categories suggested here.

Practical implications

The great variety of criminal activities is classified in this paper so that practitioners can organize their thinking around crime themes rather than crime examples when mapping crime.

Social implications

The public and society at large will be able to understand the confusing variety of financial crime in terms of main categories.

Originality/value

There has been some confusion among both researchers and practitioners when communicating about examples of financial crime. The organizing framework in this paper will help allocate crime examples to main categories of financial crime.

Details

Journal of Financial Crime, vol. 17 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 5 October 2015

Jonathan Clough

The purpose of this paper is to consider potential criminal law responses to the global challenge of “identity crime”. In particular, it focuses on a specific offence of “identity

2565

Abstract

Purpose

The purpose of this paper is to consider potential criminal law responses to the global challenge of “identity crime”. In particular, it focuses on a specific offence of “identity theft”. It begins with a discussion of the meaning of “identity” in the context of modern transactions, before defining “identity crime” and related terms. Legal responses are then considered before turning to the importance of harmonisation. The transnational nature of modern identity crimes makes it essential that law enforcement agencies not only have suitable offences at their disposal but also the frameworks to facilitate international cooperation.

Design/methodology/approach

Given the increasingly transnational and organized nature of modern identity crime, this paper adopts a comparative approach. It draws upon provisions from Australia, Canada, the UK and the USA. It also looks at responses to identity crime at the regional and international level.

Findings

Although there is currently no international instrument which specifically and comprehensively addresses identity theft, it is argued that there is an urgent need for further international discussion as to the desirability and form of identity theft provisions. While international agreement may not be reached, such discussions are important in assisting countries to develop appropriate legal frameworks and capacity to address the modern fraud environment.

Originality/value

It is hoped that this paper will contribute to, and facilitate, important ongoing discussions as to the most effective ways in which to tackle identity crime at the national and international levels.

Details

Journal of Financial Crime, vol. 22 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of over 1000