Search results

1 – 10 of 800
Article
Publication date: 11 October 2011

Chad Albrecht, Conan Albrecht and Shay Tzafrir

The purpose of this paper is to present and explain the identity theft cycle. The identity theft cycle explains how a perpetrator goes through various stages of confidence…

3148

Abstract

Purpose

The purpose of this paper is to present and explain the identity theft cycle. The identity theft cycle explains how a perpetrator goes through various stages of confidence and experimentation when stealing an individual's identity.

Design/methodology/approach

The paper takes a conceptual approach by first describing identity theft in detail and then discussing the seriousness of identity theft for consumers today. The paper then presents and explains the identity theft cycle in greater detail including the stages of discovery, action, and trial.

Findings

The paper provides evidence to suggest that if identity theft is detected early, consumers can protect themselves from the vast and difficult consequences of identity theft.

Originality/value

This paper fulfills an important area of research by providing basic information about the nature of identity theft. This paper also discusses the various ways that perpetrators steal consumers' information, as well as teaches consumers how to proactively protect themselves from identity theft.

Details

Journal of Financial Crime, vol. 18 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 5 May 2020

Chander Mohan Gupta and Devesh Kumar

This paper aims to study the concept of identity fraud and how these identity thefts can actually lead to financial crime. These crimes which usually were done in the

Abstract

Purpose

This paper aims to study the concept of identity fraud and how these identity thefts can actually lead to financial crime. These crimes which usually were done in the traditional way now have taken leaps with the increase in the use of cyber world.

Design/methodology/approach

Several research papers, articles and newsfeeds were referred to study the concept, growth, scope, effect and impact of identity theft. It was also found that identity theft is the most common type of cybercrimes.

Findings

Identity theft though a simple crime but if not taken care of can lead to multiple crimes which can affect not only individuals but also companies. And when these crimes impact companies, they can actually hamper the economy as a whole.

Practical implications

Information for the same is not available very easily, so the study is solely based on secondary data.

Social implications

Identity theft effects an individual not only financially but also mentally and socially; thus, these effect each and every one in the said economy.

Originality/value

This paper is an original work of the authors, and it is for the use of students, educators and academicians.

Details

Journal of Financial Crime, vol. 27 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 2 October 2017

Kai S. Koong, Lai C. Liu, Hong Qin and Tingting Ying

The purpose of this paper is to report on the findings and lessons that were learned from the many cases of internet fraud complaints that are gathered by the Federal…

1273

Abstract

Purpose

The purpose of this paper is to report on the findings and lessons that were learned from the many cases of internet fraud complaints that are gathered by the Federal Trade Commission in the USA. The implications that are contained in the behavior of the complaints and trends identified are critical for addressing all types of online criminal activities in the increasing world of cybercrimes.

Design/methodology/approach

Data for this paper are extracted from the Consumer Sentinel Network Data Handbook covering a period of 13 years. Using the raw data, the occurrences were plotted and trends (number of cycles, time between cycles, and leading state and lagging states) were identified. Descriptive statistics covering the 13 years were examined and discussed. Using 20002 as the base year, the rate of growth of each of the states were ranked annually and were tested for stability and predictability using non-parametric approaches.

Findings

The key findings are indigenous to the occurrences of online fraud complaints in the USA. However, as the leading nation with the best database on fraud complaints, the findings are mission critical to fraud prevention across the globe. Specifically, this study found that since 2002, there have been four distinct cycles. Each cycle is clearly noticeable because there is a rapid growth in the number of crime complaints in the beginning half of the period followed by a slowing down period. However, the speed of change from one cycle to the next is steeper and the time gap is faster. While it is true that from the perspective of all the 50 states, the ranks appear to change every year and thus are not stable. However, the majority of the changes are relatively small so their relative positions by rank are still predictable.

Originality/value

The paper extends existing understanding of online fraud occurrences in the USA. The findings are timely and based on longitudinal data that span over a decade. The four new cycles identified are critical to the body of knowledge. The observed change in time from one cycle to another and its changes from a mathematic to a geometric one are also new. The findings are invaluable to persons working in law enforcement related occupations (auditors, lawyers, forensic experts, among others) and who must deal with the increasing problem of online fraud and cybercrimes.

Details

International Journal of Accounting & Information Management, vol. 25 no. 4
Type: Research Article
ISSN: 1834-7649

Keywords

Article
Publication date: 9 October 2007

Rika Butler

The purpose of this paper is to aim to educate the internet consumer, who may be a potential phishing victim, and to suggest a framework of anti‐phishing measures…

3678

Abstract

Purpose

The purpose of this paper is to aim to educate the internet consumer, who may be a potential phishing victim, and to suggest a framework of anti‐phishing measures, following the staggering increase in the number of recent phishing attacks. Phishing describes a method of online identity theft, in which phishers typically pose as legitimate organisations when sending deceptive e‐mail messages to internet users. When they respond to such e‐mails, victims are lured to malicious web sites, where they are duped into disclosing their personal details. In this way, phishers are able to commit identity theft, with possibly devastating consequences for the victim.

Design/methodology/approach

After a literature review of the available sources, the phishing threat is investigated by analysing the modus operandi of phishers and the basic components of a typical phishing scheme. A possible solution for the phishing problem is examined.

Findings

Phishers continually target the weakest link in the security chain, namely consumers, in their attacks. Educating the online consumer about phishing, as well as the implementation and proper application of anti‐phishing measures, are critical steps in protecting the identities of online consumers against e‐mail phishing attacks.

Originality/value

This article proposes measures that internet consumers can take to ward off phishing attacks, as well as remedial actions that they can take after falling victim to such an attack. By implementing these measures online, consumers can minimise the risk of becoming victims of successful phishing attacks, as well as remedy the negative effects of any past disclosure of information to phishers.

Details

The Electronic Library, vol. 25 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Book part
Publication date: 22 May 2015

Robert Smith and Gerard McElwee

To explore and document the emerging international market for stolen tractors and plant in the United Kingdom. Whilst this may appear to be a criminological problem…

Abstract

Purpose

To explore and document the emerging international market for stolen tractors and plant in the United Kingdom. Whilst this may appear to be a criminological problem relating specifically to rural crime, it is a sophisticated international criminal business organised by traditional organised crime groups (OCGs) such as the Italian, Polish and Turkish Mafia’s in conjunction with a network of criminal entrepreneurs.

Methodology/approach

Using annual statistical data provided by National Farmers Union (NFU) Mutual and Plant and Agricultural National Intelligence Unit (PANIU) and other material sourced using documentary research techniques supplemented by qualitative interviews with industry specialists we present 10 micro-case studies of rural OCGs engaged in this lucrative enterprise crime. The data is verified and authenticated using narrative inquiry techniques.

Findings

There is an entrepreneurial dimension to the crime because traditional criminal families with knowledge of rural areas and rural social capital form alliances with OCGs. The practical utility of the NFU model of entrepreneurial alliances with interested parties including the police is highlighted.

Research limitations/implications

Implications for research design, ethics and the conduct of such research which are identified and discussed. These include the need to develop an investigative framework to protect academic researchers similar to guidelines in place to protect investigative journalists.

Practical implications

An investigative framework and the adaption of the business model canvass (Osterwalder & Pigneur, 2010) to cover illegal business models are proposed.

Social implications

Suggestions are provided for the need to legislate against international criminal conspiracies.

Originality/value

Uses a mixture of entrepreneurship and criminological theories to help develop an understanding of the problem from an investigative perspective.

Details

Exploring Criminal and Illegal Enterprise: New Perspectives on Research, Policy & Practice
Type: Book
ISBN: 978-1-78441-551-8

Keywords

Article
Publication date: 25 August 2021

Umar Mir, Arpan Kumar Kar and Manmohan Prasad Gupta

This conceptual article’s primary aim is to identify the significant stakeholders of the digital identity system (DIS) and then highlight the impact of artificial…

Abstract

Purpose

This conceptual article’s primary aim is to identify the significant stakeholders of the digital identity system (DIS) and then highlight the impact of artificial intelligence (AI) on each of the identified stakeholders. It also recommends vital points that could be considered by policymakers while developing technology-related policies for effective DIS.

Design/methodology/approach

This article uses stakeholder methodology and design theory (DT) as a primary theoretical lens along with the innovation diffusion theory (IDT) as a sub-theory. This article is based on the analysis of existing literature that mainly comprises academic literature, official reports, white papers and publicly available domain experts’ interviews.

Findings

The study identified six significant stakeholders, i.e. government, citizens, infrastructure providers, identity providers (IdP), judiciary and relying parties (RPs) of the DIS from the secondary data. Also, the role of IdP becomes insignificant in the context of AI-enabled digital identity systems (AIeDIS). The findings depict that AIeDIS can positively impact the DIS stakeholders by solving a range of problems such as identity theft, unauthorised access and credential misuse, and will also open a possibility of new ways to empower all the stakeholders.

Research limitations/implications

The study is based on secondary data and has considered DIS stakeholders from a generic perspective. Incorporating expert opinion and empirical validation of the hypothesis could derive more specific and context-aware insights.

Practical implications

The study could facilitate stakeholders to enrich further their understanding and significance of developing sustainable and future-ready DIS by highlighting the impact of AI on the digital identity ecosystem.

Originality/value

To the best of the authors’ knowledge, this article is the first of its kind that has used stakeholder theory, DT and IDT to explain the design and developmental phenomenon of AIeDIS. A list of six significant stakeholders of DIS, i.e. government, citizens, infrastructure providers, IdP, judiciary and RP, is identified through comprehensive literature analysis.

Details

Journal of Science and Technology Policy Management, vol. 13 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 12 October 2010

Petter Gottschalk

The purpose of this paper is to present a systematic approach to classify financial crime into main categories as well as sub categories.

7089

Abstract

Purpose

The purpose of this paper is to present a systematic approach to classify financial crime into main categories as well as sub categories.

Design/methodology/approach

Based on a literature review, the main four categories were labeled corruption, fraud, theft, and manipulation, respectively.

Findings

There is a massive variety of crime types and crime names in the literature that can successfully be allocated to main categories of financial crime.

Research limitations/implications

The paper is based on exploratory research to stimulate future research in refining and improving the categories suggested here.

Practical implications

The great variety of criminal activities is classified in this paper so that practitioners can organize their thinking around crime themes rather than crime examples when mapping crime.

Social implications

The public and society at large will be able to understand the confusing variety of financial crime in terms of main categories.

Originality/value

There has been some confusion among both researchers and practitioners when communicating about examples of financial crime. The organizing framework in this paper will help allocate crime examples to main categories of financial crime.

Details

Journal of Financial Crime, vol. 17 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 25 April 2008

Alan D. Smith

The purpose of this paper is to provide practitioners of management a sense of importance in providing a balance between providing customer service and still safeguarding…

1013

Abstract

Purpose

The purpose of this paper is to provide practitioners of management a sense of importance in providing a balance between providing customer service and still safeguarding personal identity through a national identity program.

Design/methodology/approach

A review of the applied literature on national identity programs and a personal interview of 252 professional and semi‐professional people was conducted, representative of the service industries located in the metropolitan section of Pittsburgh, PA.

Findings

Via multiple linear regression, χ2, and factor analysis, virtually all the basic personal information and customer relationship management (CRM)‐related tenets of benefits with identity program, global security concerns, technology enabled, personal identity concerns, standardization concerns, wealth and education factors, cost of capita, online experiences, and confront with personal information, were found be statistically significant and positively related to the degree of invasion of privacy factor.

Practical implications

Although, there are many beneficial reasons why national identity programs should be implemented, such as security, convenience, and enhancing CRM‐related strategies, the vast majority of citizens have many fears and feel there are too many risks involved.

Originality/value

Few empirical studies existing in the literature, especially from a business perspective concerning national identity initiatives. These issues regarding national identification cards and CRM were addressed through exploratory data reduction analyses. Although, there were several significant and negative issues associated with implementation, in general, if citizens are better educated about the benefits of a national identification card they are more willing to adopt it and pay for the program.

Details

Industrial Management & Data Systems, vol. 108 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Book part
Publication date: 24 June 2011

Michael Levi

A number of approaches might be taken to the relationship between economic crises and white-collar crimes. One is to review the role that white-collar crimes played in…

Abstract

A number of approaches might be taken to the relationship between economic crises and white-collar crimes. One is to review the role that white-collar crimes played in causing economic crisis, but this is legally problematic. This chapter begins with a discussion of social reaction to different forms of white-collar crime, and then goes on to examine briefly the evidence for the impact of the economic crisis on levels of frauds. The core argument is that the economic crisis did affect social and official reaction to some frauds – though the impact of this may be temporary – but that unlike most “law and order” issues, politicians around the world have typically downplayed fears of elite criminality and serious misconduct. Most reactions to white-collar crime reflect longer-term populist sentiments that prioritize offenses such as identity theft and fraud. Furthermore, there is little evidence that the Global Financial Crisis did much to increase the risk of fraud, though it is easy to misattribute the revelation of longer-running frauds to the crisis instead of to the fact that the recession smoked them out of the woodwork.

Details

Economic Crisis and Crime
Type: Book
ISBN: 978-0-85724-801-5

Article
Publication date: 31 May 2005

Alicia Ladson and Bardo Fraunholz

As traditional organizations using their websites for eCommerce transactions are increasing at an exponential rate, privacy concerns of users are also on the rise. To gain…

1287

Abstract

As traditional organizations using their websites for eCommerce transactions are increasing at an exponential rate, privacy concerns of users are also on the rise. To gain an insight into these concerns, existing policies and legislation, we conducted the research reported in this paper, in 2003. To augment the literature synthesis, a multiple case study analysis was conducted, based on six large organisations in Australia. Our research findings suggested that in the Australian context, an online privacy policy (OPP) on the website which complies with the Privacy Act, supported by few best practices are reasonably able to address online privacy concerns. However, these findings are restricted in time frame, indicative and relevant in the Australian context. Nevertheless, we hope to stimulate academic research enquiry and discussion forums through this research.

Details

Journal of Information, Communication and Ethics in Society, vol. 3 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

1 – 10 of 800