Search results
1 – 10 of 124Alexander Joseph Vanhee and Rachel McNealey
The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate…
Abstract
Purpose
The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate whether aspects of an individual’s residence affect their likelihood of becoming identity theft victims.
Design/methodology/approach
The authors conduct logistic regressions of whether a respondent was an identity theft victim in the past year using the following variables as key predictors: number of housing units in a residence, whether the respondent operates a business out of their residence and if residence access is restricted.
Findings
The results suggest that location influences the likelihood of identity theft to a modest degree though some aspects of location (possibly those related to rewards perceptions) may be more relevant than others. Meanwhile, though location may influence initial target selection, whether someone is victimized may be more dependent on factors such as personal behavior.
Originality/value
To the best of the authors’ knowledge, this manuscript represents one of the first investigations into the relationship between microlevel place and the incidence of identity theft. Furthermore, it provides evidence that one does exist which bears further inquiry.
Details
Keywords
Jessica Rene Peterson, Kyle C. Ward and Michaela Lawrie
The purpose is to understand how farmers in rural American communities perceive crime, safety and policing.
Abstract
Purpose
The purpose is to understand how farmers in rural American communities perceive crime, safety and policing.
Design/methodology/approach
An online survey, adapted from a version used in Victoria, Australia (Harkness, 2017), was modified and administered through social media and farming organizations throughout three US states. The survey covers topics relating to crime and victimization, feelings of safety or fear in rural areas, policing practices and trust in police in their areas and any crime prevention practices that respondents use.
Findings
With nearly 1,200 respondents and four scales investigated, results indicate that those respondents with more favorable views of law enforcement and the criminal justice system had the highest fear of crime, those who had been prior victims of crime had a higher fear of crime than those who did not, those with higher community involvement had higher fear of crime, and those from Nebraska compared to Colorado had higher fear of crime.
Research limitations/implications
A better understanding of the agricultural community’s perceptions of crime, safety and policing will aid law enforcement in community policing efforts and in farm crime investigation and prevention. Limitations of the study, including the distribution method will be discussed.
Originality/value
Farm- and agriculture-related crimes have serious financial and emotional consequences for producers and local economies. Stereotypes about rural areas being “safe with no crime” are still prevalent. Rural American farmers’ perceptions of crime, safety and police are largely absent from the literature and are important for improving farm crime prevention.
Details
Keywords
Natile Nonhlanhla Cele and Sheila Kwenda
The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…
Abstract
Purpose
The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.
Design/methodology/approach
Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.
Findings
A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.
Originality/value
With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.
Details
Keywords
Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre
Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…
Abstract
Purpose
Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.
Design/methodology/approach
This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.
Findings
Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.
Originality/value
To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.
Details
Keywords
Demet Genceli, Gökçe Yüksek and Selda Uca
This study aims to reveal the travel insurance behavior of digital nomads systematically. For this purpose, the habits and preferences of digital nomads for travel and health…
Abstract
Purpose
This study aims to reveal the travel insurance behavior of digital nomads systematically. For this purpose, the habits and preferences of digital nomads for travel and health insurance were investigated based on the problems they experience during their travels.
Design/methodology/approach
Within the scope of multimethod qualitative research, the insurance behaviors of digital nomads were investigated in depth by using both interview and content analysis techniques for social media comments. In the first stage of the study, the interview technique was used to describe the main factors underlying the insurance behaviors of digital nomads. In the second stage, the comments of digital nomads on social media platforms were evaluated by content analysis and themes regarding the insurance behaviors of digital nomads were reached.
Findings
The inadequacies of the current global system and national order determine the travel insurance behavior of digital nomads, who are generally opposed to the existing order and tend to escape from authority and routine. It was found that digital nomads care about the speed at which insurance companies meet their demands, the coverage of insurance policies (medical and travel-related components of insurance) and the cost of insurance behavior.
Research limitations/implications
This study aims to provide a new perspective to the literature by conducting multimethod qualitative research within the scope of the risks experienced by digital nomads and their travel insurance behavior. The study shows that digital nomads cannot escape from national regulations. They have to take out insurance in countries with low cost of living due to problems with the health system and security, and in some countries, it is due to country regulations. In practice, the study provides conclusions and recommendations for current and potential digital nomads, insurance companies and governments regarding the insurance behavior of digital nomads. In particular, the study concludes with recommendations for insurance companies in terms of insurance product development and the use of social policy tools for governments.
Originality/value
This study offers a perspective on the key factors underlying the travel insurance behavior of digital nomads.
Details
Keywords
Iftikhar Ahmad, Salim Khan and Shahid Iqbal
The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…
Abstract
Purpose
The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.
Design/methodology/approach
In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.
Findings
The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.
Research limitations/implications
This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.
Practical implications
This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.
Social implications
This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.
Originality/value
This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.
Details
Keywords
Rebecca Nana Yaa Ayifah and Adriana Apawo Adda
The rapid growth of the mobile money industry has been matched by a rise in mobile money fraud. The technology required to apprehend perpetrators of such fraud is nonexistent in…
Abstract
Purpose
The rapid growth of the mobile money industry has been matched by a rise in mobile money fraud. The technology required to apprehend perpetrators of such fraud is nonexistent in most developing countries. Hence, the need for individuals to be willing to pay for insurance against such frauds is crucial. This paper aims to examine individuals’ willingness to pay for insurance against mobile money fraud in Ghana.
Design/methodology/approach
The paper uses nationally representative data collected from 4,266 adults (persons 18 years and above) in Ghana. Individuals’ willingness to pay premiums for protection against mobile money fraud was elicited by a single-bound dichotomous choice and open-ended contingent valuation designs.
Findings
On average, 24.34% of Ghanaians are willing to pay premiums for insurance against mobile money frauds, with more men (26.37%) being willing than women (22.56%). Similarly, the average monthly premium that men are willing to pay for protection against mobile money fraud is GH¢32.16 (US$8.16), while that of women is GH¢22.5 (US$5.62). Furthermore, the results show that years of schooling, income, previous fraud experience, and using the accounts for saving are all positively associated with willingness to pay. However, using other networks apart from MTN has a negative association with willingness to pay.
Originality/value
To the best of our knowledge, this is the first study that examines willingness to pay for insurance against mobile money fraud. Thus, this is the first that estimate quantitatively how much mobile account holders will pay as premiums for insurance against mobile money fraud.
Details
Keywords
Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…
Abstract
Purpose
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.
Design/methodology/approach
The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.
Findings
The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.
Originality/value
This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.
Details
Keywords
Olusola Joshua Olujobi and Tunde Ebenezer Yebisi
The purpose of this study is to examine the corruption prevalent in the distribution of COVID-19 palliatives during the lockdown and movement restrictions in the country. This…
Abstract
Purpose
The purpose of this study is to examine the corruption prevalent in the distribution of COVID-19 palliatives during the lockdown and movement restrictions in the country. This study seeks to analyse the current state of corruption in the distribution of COVID-19 palliatives and public health facilities in Nigeria while also providing a legal insight and strategic blueprint to combat corruption. To this end, this study will address the current legal framework for combating corruption and build upon this to formulate a working strategy for tackling corruption in the future.
Design/methodology/approach
Using a doctrinal legal research methodology, this study draws upon existing literature, tertiary data sources and information from the Nigeria Centre for Disease Control. The collected data is analysed and compared with current literature to identify key findings. Rent-seeking and utilitarian theories of the law were examined to guide this study. This study offers useful insights into combating corruption. The use of this method is justified, as it enhances the credibility of the findings on the importance of strategies for future emergencies. This legal research approach is consistent with the law and can be easily verified. The empirical aspect of this study involved a survey of multidimensional health-care and economic data set of 36 states in Nigeria plus the Federal Capital Territory on COVID-19 in Nigeria. A survey linearised regression model was estimated to determine the influence of government revenue and public health-care facilities in the control of the virus spread in Nigeria.
Findings
This study reveals the need for emphasis on the imperative of combating corruption in the distribution of COVID-19 palliatives and establishing economic resilience through transparent and accountable practices, supported by legal frameworks.
Research limitations/implications
Rent-seeking and utilitarian theories of law are evaluated because of their impacts on combating corruption. The limitation of this study is the intricacy of gathering data on COVID-19 palliatives corruption in Nigeria because of secrecy and the absence of reliable data on the subject.
Practical implications
Estimating the exact number of stolen palliatives and their fiscal impact on Nigeria's economy proves to be a formidable task because of the covert nature of corruption. This study equips policymakers in Nigeria with a better understanding of the legal challenges posed by corruption in the health care sector and provides an effective strategy to combat it.
Social implications
The lack of reliable data on the extent of palliative theft hinders the ability of lawmakers to enact effective legislation and strategies for combating corruption in the distribution of COVID-19 palliatives and addressing future emergencies in Nigeria. The policy implications of this study can assist policymakers in Nigeria and other countries in formulating measures to combat corruption in the distribution of COVID-19 palliatives and other future emergencies. Furthermore, it recommends the overhaul of anti-corruption laws and mechanisms in Nigeria to ensure effective measures against corruption.
Originality/value
In conclusion, this study contributes to knowledge by proposing a legal model centred on people's participation to enhance transparency and accountability in future palliative distribution processes. This study recommends legal strategies that can effectively address corruption in future emergencies or shocks. This study proposes a strategic blueprint to tackle corruption in the future. This blueprint includes an analysis of existing laws and regulations, as well as potential policy changes and legislative reform. This study also includes recommendations for improved enforcement and oversight mechanisms and for improved public awareness and education. As part of this, this study considers the potential for public–private partnerships to increase transparency and accountability in public health and health-care services.
Details
Keywords
The objective of this study was to conduct a bibliometric analysis of the existing literature on organizational deviance to assess how far this concept has progressed since its…
Abstract
Purpose
The objective of this study was to conduct a bibliometric analysis of the existing literature on organizational deviance to assess how far this concept has progressed since its introduction in the domain of organizational behavior.
Design/methodology/approach
This study employs bibliometric methodologies (citation analysis, co-citation analysis and co-occurrence of author keywords) using VOSviewer. The Scopus database was used, as it is the largest database of scholarly literature.
Findings
The findings indicate the character and direction of organizational research over the past two decades. Organizational deviance due to psychological contract breach, organizational deviance in the context of organizational cynicism and organizational deviance in the context of psychological capital are the three major themes in the literature on organizational deviance. In addition, the study highlights the most significant authors, journals, institutions and nations in the field of value co-creation research as well as potential future research areas in this area.
Research limitations/implications
The use of a single database and the inability to contextualize the citation structure of papers revealed by the review are limitations of this study.
Originality/value
This study examines the structure of the literature on organizational deviance and charts the field's evolution over time.
Details