Search results

1 – 10 of 114
Article
Publication date: 15 November 2022

Shefali Saluja

The fraud landscape for FinTech industry has increased over the past few years, certainly during the time of COVID-19, FinTech market reported rapid growth in the fraud cases…

Abstract

Purpose

The fraud landscape for FinTech industry has increased over the past few years, certainly during the time of COVID-19, FinTech market reported rapid growth in the fraud cases (World Bank, 2020). Taking the consideration, the paper has qualitatively understood the loopholes of the FinTech industry and designed a conceptual model declaring “Identity Theft” as the major and the common fraud type in this industry. The paper is divided in two phases. The first phase discusses about the evolution of FinTech industry, the second phase discusses “Identity Theft” as the common fraud type in FinTech Industry and suggests solutions to prevent “Identity Theft” frauds. This study aims to serve as a guide for subsequent investigations into the FinTech sector and add to the body of knowledge regarding fraud detection and prevention. This study would also help organisations and regulators raise their professional standards in relation to the global fraud scene.

Design/methodology/approach

This paper revisits the literature to understand the evolution of FinTech Industry and the types of FinTech solutions. The authors argue that traditional models must be modernised to keep up with the current trends in the rapidly increasing number and severity of fraud incidents and however introduces the conceptual model of the common fraud type in FinTech Industry. The research also develops evidences based on theoretical underpinnings to enhance the comprehension of the key fraud-causing elements.

Findings

The authors have identified the most common fraud type in the FinTech Industry which is “Identity Theft” and supports the study with profusion of literature. “Identity theft” and various types of fraud continue to outbreak customers and industries similar in 2021, leaving several to wonder what could be the scenario in 2022 and coming years ahead (IBS Inteligence, 2022). “Identify theft” has been identified as one the common fraud schemes to defraud individuals as per the Association of Certified Fraud Examiners. There is a need for many of the FinTech organisations to create preventive measures to combat such fraud scheme. The authors suggest some preventive techniques to prevent corporate frauds in the FinTech industry.

Research limitations/implications

This study identifies the evolution of FinTech industry, major evidences of Identity Thefts and some preventive suggestions to combat identity theft frauds which requires practical approach in FinTech Industry. Further, this study is based out of qualitative data, the study can be modified with statistical data and can be measured with the quantitative results.

Practical implications

This study would also help organisations and regulators raise their professional standards in relation to the global fraud scene.

Social implications

This study will serve as a guide for subsequent investigations into the FinTech sector and add to the body of knowledge regarding fraud detection and prevention.

Originality/value

This study presents evidence for the most prevalent fraud scheme in the FinTech sector and proposes that it serve as a theoretical standard for all ensuing comparison.

Details

Journal of Financial Crime, vol. 31 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 25 October 2023

Ali Katouzian Bolourforoush and Hamid Jahankhani

Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman…

Abstract

Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman Empire, lenders in temples, provided loans, and accepted deposits while performed change of money. The archaeological evidence uncovered in India and China corroborates this. The major development in banking came predominantly in the mediaeval, Renaissance Italy, with the major cities Florence, Venice and Genoa being the financial centres. Technology has become an inherent and integral part of our lives. We are generating a huge amount of data in transfer, storage and usage, with greater demands of ubiquitous accessibility, inducing an enormous impact on industry and society. With the emergence of smarter cities and societies, the security challenges pertinent to data become greater, impending impact on the consumer protection and security. The aim of this chapter is to highlight if SSI and passwordless authentication using FIDO-2 protocol assuage security concerns such as authentication and authorisation while preserving the individual's privacy.

Details

Technology and Talent Strategies for Sustainable Smart Cities
Type: Book
ISBN: 978-1-83753-023-6

Keywords

Article
Publication date: 17 August 2021

Abir Al-Harrasi, Abdul Khalique Shaikh and Ali Al-Badi

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and…

1047

Abstract

Purpose

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and deploy multiple layers of security protection technology and protocols such as firewalls, VPNs and IPsec VPN. However, these technologies do not guarantee data protection, and especially from insiders. Insider threat is a critical risk that can cause harm to the organisation through data theft. The main purpose of this study was to investigate and identify the threats related to data theft caused by insiders in organisations and explore the efforts made by them to control data leakage.

Design/methodology/approach

The study proposed a conceptual model to protect organisations’ data by preventing data theft by malicious insiders. The researchers conducted a comprehensive literature review to achieve the objectives of this study. The collection of the data for this study is based on earlier studies conducted by several researchers from January 2011 to December 2020. All the selected literature is from journal articles, conference articles and conference proceedings using various databases.

Findings

The study revealed three main findings: first, the main risks inherent in data theft are financial fraud, intellectual property theft, and sabotage of IT infrastructure. Second, there are still some organisations that are not considering data theft by insiders as being a severe risk that should be well controlled. Lastly, the main factors motivating the insiders to perform data leakage activities are financial gain, lack of fairness and justice in the workplace, the psychology or characteristics of the insiders, new technologies, lack of education and awareness and lack of management tools for understanding insider threats.

Originality/value

The study provides a holistic view of data theft by insiders, focusing on the problem from an organisational point of view. Organisations can therefore take into consideration our recommendations to reduce the risks of data leakage by their employees.

Details

International Journal of Organizational Analysis, vol. 31 no. 3
Type: Research Article
ISSN: 1934-8835

Keywords

Book part
Publication date: 30 March 2023

Megan Seymore and Mary B. Curtis

Some of the best information for preventing accounting violations is received from employees who have observed the unethical behavior (Henning, 2016). However, receiving

Abstract

Some of the best information for preventing accounting violations is received from employees who have observed the unethical behavior (Henning, 2016). However, receiving information about accounting violations or other unethical behavior in organizations requires employees to voluntarily report the behavior. Employees may be particularly hesitant to report unethical behavior when the behavior benefits them. Employees may also justify their own unethical behavior as morally appropriate when their moral identity allows the behavior. The authors draw on psychology and ethics literature to examine the relationships among moral identity, moral disengagement, and unethical behavior. In the exploration of behavior, the authors examine both commissions and omissions. While unethical commissions are violations directly committed by an individual without cooperation from others, unethical omissions are violations resulting from an individual failing to take steps necessary to correct another's unethical behavior.

The authors conduct a survey about cheating with a sample of college students. Using structural equation modeling, the authors find that intentions to engage in unethical commissions are positively associated with moral disengagement, while unethical omissions do not appear to create the moral disengagement that can arise from cognitive dissonance. The authors also find a feedback loop from moral disengagement to future intentions, which suggests moral disengagement created from one unethical act increases intentions for future unethical behavior. Finally, the authors find a simple intervention that can help to increase the moral intensity of observed unethical behavior.

Details

Research on Professional Responsibility and Ethics in Accounting
Type: Book
ISBN: 978-1-80455-792-1

Keywords

Book part
Publication date: 16 November 2023

Jaekyung Ha, Stine Grodal and Ezra W. Zuckerman Sivan

Our prior work has identified a trade-off that new entrants face in obtaining favorable market reception, whereby initial entrants suffer from a deficit of legitimacy whereas…

Abstract

Our prior work has identified a trade-off that new entrants face in obtaining favorable market reception, whereby initial entrants suffer from a deficit of legitimacy whereas later entrants suffer from a deficit of authenticity. This research has also proposed that a single mechanism is responsible for this trade-off: the tendency for customers and other stakeholders to assess the entrant's claim to originality based on the visible work that it has done to legitimate the new product or organizational form. This chapter extends and deepens our understanding of such “legitimation work” by showing how it can illuminate cases that seem in the first instance to defy this trade-off. In particular, we focus on two “off-diagonal” cases: (a) when, as in the case of “patent trolls” and fraudulent innovators, early entrants are viewed as inauthentic despite having a credible claim to originality; (b) when late entrants, as in the case of Dell Computers, mechanical watches and baseball ballparks, are viewed as authentic despite obviously not being the originators. We clarify how each off-diagonal case represents an ‘exception that proves the rule’ whereby audiences attribute authenticity on the basis of legitimation work rather than on the order of entry per se. The last case also leads to an opportunity to clarify why “cultural appropriation” can sometimes project authenticity and sometimes inauthenticity, why audiences bother to make inferences about a producer's authenticity on the basis of visible legitimation work, and why legitimacy is a universal goal of early movers whereas authenticity varies in its importance.

Details

Organization Theory Meets Strategy
Type: Book
ISBN: 978-1-83753-869-0

Keywords

Article
Publication date: 9 January 2024

Jonathan Torres-Tellez

Crime increased in Spain during the period of 2017–2019 after a decade of decline. This coincides with severe housing deprivation multiplying by three in just four years…

Abstract

Purpose

Crime increased in Spain during the period of 2017–2019 after a decade of decline. This coincides with severe housing deprivation multiplying by three in just four years, affecting 3.4% of the population in 2020. However, no research has been found that analyzes whether this deterioration of the physical conditions of housing and its environmental elements has impacted the level of crime in Spain. This study aims to analyze how housing deprivation affects crime in the Spanish context.

Design/methodology/approach

For this purpose, different items that are considered by Eurostat as elements of housing deprivation are used. The difference generalized method of moments estimator is used for 16 Spanish regions that comprises the period from 2013 to 2019.

Findings

The results suggest that certain structural and environmental elements of housing are positively associated with crime: space (0.5% and 0.4%) and high housing expenditure (0.4% and 0.5%) are positively correlated with the two dependent variables; the lack of light and overcrowding stand out as they establish a positive and statistically significant association with four out of the six analyzed crime categories; the absence of lighting effect reaches up to 1.8% and 1.7% in the case of violent robberies and vehicle theft, respectively. Finally, pollution is negatively associated with robbery with violence (−1.9%), theft (−0.7%) and robbery with force (−0.5%).

Originality/value

To the best of the author’s knowledge, this is the first study that examines whether this deterioration of the physical conditions of housing has impacted the level of crime in Spain. It is also pioneering at the European level by using nonmonetary dimensions of inequality such as housing.

Details

International Journal of Housing Markets and Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1753-8270

Keywords

Article
Publication date: 23 August 2022

Carl Kühl, Heather Dawn Skipworth, Michael Bourlakis and Emel Aktas

This paper aims to examine the relationships between macro-, meso- and micro-level contextual factors that enable or inhibit the contribution of product service systems (PSS) to…

1317

Abstract

Purpose

This paper aims to examine the relationships between macro-, meso- and micro-level contextual factors that enable or inhibit the contribution of product service systems (PSS) to circularity. It is informed by the natural resource-based view (NRBV) and the multi-level perspective as theoretical lenses.

Design/methodology/approach

A theory elaboration approach is used through three in-depth case studies of UK and German manufacturers. Case studies provide use- and result-oriented PSS for personal computers, power tools and wind turbines. Multiple sources of evidence, including 20 semi-structured interviews, company documents and quantitative data, are triangulated to improve the validity of the results.

Findings

Empirical evidence for relationships between macro-, meso- and micro-level contextual factors show significant barriers to the extending and cycling of resource loops, primarily through maintenance, repairs and refurbishment. A firm’s environmental awareness has a determining role in the contribution of PSS to circularity. The evidence from two use-oriented PSS reveals different circularity maturity levels.

Originality/value

This research makes three key contributions. Firstly, it elaborates on NRBV by showing that a firm’s environmental awareness determines product stewardship. The type of product stewardship practices depends on the enabling and inhibiting effects of macro- and meso-level factors. Secondly, it shows that use-oriented PSS have different circularity profiles and proposes three circularity maturity levels. Finally, it provides an empirically validated framework of macro-, meso- and micro-level enablers and barriers and how they interact to enable or inhibit circularity in PSS.

Details

International Journal of Operations & Production Management, vol. 43 no. 4
Type: Research Article
ISSN: 0144-3577

Keywords

Expert briefing
Publication date: 28 April 2023

These technologies are being adopted in the context of hybrid working and global digital supply chain integration. These technologies promise improved efficiency, service…

Details

DOI: 10.1108/OXAN-DB278751

ISSN: 2633-304X

Keywords

Geographic
Topical
Content available
Book part
Publication date: 2 October 2023

Sydney Chapados

In 2009, the Liberal government of Ontario released their first “streamlined” poverty reduction strategy to end child poverty in the province. The strategy was renewed in 2014…

Abstract

In 2009, the Liberal government of Ontario released their first “streamlined” poverty reduction strategy to end child poverty in the province. The strategy was renewed in 2014, and an updated strategy was released in 2021 by the Conservative government of Ontario. Based on ongoing research, this chapter explores how these Poverty reduction strategies mobilize a historical conception of low-income urban environments as threats to child development. I show that, rather than end poverty, these conceptions are used to justify community revitalization efforts that displace low-income populations while prioritizing and benefiting private market investment. Central to these strategies is the figure of the child, who is constructed as innocent and vulnerable, requiring protection and saving from the perils of poverty by middle- and upper-class interventions. The chapter concludes by examining the neoliberal logic that continues to inform the 2021 strategy.

Details

Sociological Research and Urban Children and Youth
Type: Book
ISBN: 978-1-80117-444-2

Keywords

Article
Publication date: 26 March 2024

Hugo Letiche and Ivo De Loo

Ethnography produces accounts; the critical reflection of accounts produces accountability. Ethnography requires accountability if meaningful conclusions and/or observations are…

Abstract

Purpose

Ethnography produces accounts; the critical reflection of accounts produces accountability. Ethnography requires accountability if meaningful conclusions and/or observations are to be made. Accountability requires ethnography if is to address lived experiences. Virno argues that the principles of “languaging” make ethnographies and accountability possible. This papers aims to describe an instance of the circularity of accountability and use this to explore Virno’s insights. Doing this helps us to see the connections between accountability and ethnography, and reflect on the nature of these interconnections.

Design/methodology/approach

Inspired by Paulo Virno’s philosophy, the authors assert that an ethnographer typically produces an account of a chosen “Other” in which this “Other” is held to account. But at the same time, the ethnographer needs to be held to account by the very same “Other” and by the “Other” of the (research) community. Furthermore, ethnographers are accountable to themselves. All these moments of accountability can endlessly circle, as responsibilization of the researchers by their Other(s) continues. For ethnography to function, this must be tamed as a (research) account ultimately has to be produced for an academic project to be considered complete. Drawing on Virno’s principle of the “negation of the negation” by the “katechon,” by the “katechon,” the authors propose a potentially valuable intervention that would enable ethnography – and by extension, ethnographers – to prosper.

Findings

The authors apply Virno’s philosophical reflections to propose a positive feedback cycle between ethnography and accountability. Virno’s ideation centers on two key concepts: (i) the multitude of social relatedness and (ii) the ontology of the languaging of individuation. Hereby, a positive circle of causality between ethnography and accountability can be realized, whereby the authors can respect but also break the causal circle(s) of ethnography and accountability. This might be achieved via a reflection on Virno’s concept of the “katechon.”

Originality/value

The authors illuminate the accountability–ethnography dynamic, providing an illustration of the circularity of ethnography and accountability and showing how Virno provides us with tools to help us deal with it. Hence, ultimately, the paper focuses on the accountability as ethnographers.

Details

Qualitative Research in Accounting & Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1176-6093

Keywords

1 – 10 of 114