Search results

1 – 10 of 124
Article
Publication date: 11 May 2023

Alexander Joseph Vanhee and Rachel McNealey

The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate…

Abstract

Purpose

The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate whether aspects of an individual’s residence affect their likelihood of becoming identity theft victims.

Design/methodology/approach

The authors conduct logistic regressions of whether a respondent was an identity theft victim in the past year using the following variables as key predictors: number of housing units in a residence, whether the respondent operates a business out of their residence and if residence access is restricted.

Findings

The results suggest that location influences the likelihood of identity theft to a modest degree though some aspects of location (possibly those related to rewards perceptions) may be more relevant than others. Meanwhile, though location may influence initial target selection, whether someone is victimized may be more dependent on factors such as personal behavior.

Originality/value

To the best of the authors’ knowledge, this manuscript represents one of the first investigations into the relationship between microlevel place and the incidence of identity theft. Furthermore, it provides evidence that one does exist which bears further inquiry.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 17 April 2024

Jessica Rene Peterson, Kyle C. Ward and Michaela Lawrie

The purpose is to understand how farmers in rural American communities perceive crime, safety and policing.

Abstract

Purpose

The purpose is to understand how farmers in rural American communities perceive crime, safety and policing.

Design/methodology/approach

An online survey, adapted from a version used in Victoria, Australia (Harkness, 2017), was modified and administered through social media and farming organizations throughout three US states. The survey covers topics relating to crime and victimization, feelings of safety or fear in rural areas, policing practices and trust in police in their areas and any crime prevention practices that respondents use.

Findings

With nearly 1,200 respondents and four scales investigated, results indicate that those respondents with more favorable views of law enforcement and the criminal justice system had the highest fear of crime, those who had been prior victims of crime had a higher fear of crime than those who did not, those with higher community involvement had higher fear of crime, and those from Nebraska compared to Colorado had higher fear of crime.

Research limitations/implications

A better understanding of the agricultural community’s perceptions of crime, safety and policing will aid law enforcement in community policing efforts and in farm crime investigation and prevention. Limitations of the study, including the distribution method will be discussed.

Originality/value

Farm- and agriculture-related crimes have serious financial and emotional consequences for producers and local economies. Stereotypes about rural areas being “safe with no crime” are still prevalent. Rural American farmers’ perceptions of crime, safety and police are largely absent from the literature and are important for improving farm crime prevention.

Details

Policing: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1363-951X

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. 30 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 26 April 2024

Demet Genceli, Gökçe Yüksek and Selda Uca

This study aims to reveal the travel insurance behavior of digital nomads systematically. For this purpose, the habits and preferences of digital nomads for travel and health…

Abstract

Purpose

This study aims to reveal the travel insurance behavior of digital nomads systematically. For this purpose, the habits and preferences of digital nomads for travel and health insurance were investigated based on the problems they experience during their travels.

Design/methodology/approach

Within the scope of multimethod qualitative research, the insurance behaviors of digital nomads were investigated in depth by using both interview and content analysis techniques for social media comments. In the first stage of the study, the interview technique was used to describe the main factors underlying the insurance behaviors of digital nomads. In the second stage, the comments of digital nomads on social media platforms were evaluated by content analysis and themes regarding the insurance behaviors of digital nomads were reached.

Findings

The inadequacies of the current global system and national order determine the travel insurance behavior of digital nomads, who are generally opposed to the existing order and tend to escape from authority and routine. It was found that digital nomads care about the speed at which insurance companies meet their demands, the coverage of insurance policies (medical and travel-related components of insurance) and the cost of insurance behavior.

Research limitations/implications

This study aims to provide a new perspective to the literature by conducting multimethod qualitative research within the scope of the risks experienced by digital nomads and their travel insurance behavior. The study shows that digital nomads cannot escape from national regulations. They have to take out insurance in countries with low cost of living due to problems with the health system and security, and in some countries, it is due to country regulations. In practice, the study provides conclusions and recommendations for current and potential digital nomads, insurance companies and governments regarding the insurance behavior of digital nomads. In particular, the study concludes with recommendations for insurance companies in terms of insurance product development and the use of social policy tools for governments.

Originality/value

This study offers a perspective on the key factors underlying the travel insurance behavior of digital nomads.

Details

Worldwide Hospitality and Tourism Themes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1755-4217

Keywords

Article
Publication date: 9 April 2024

Iftikhar Ahmad, Salim Khan and Shahid Iqbal

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…

Abstract

Purpose

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.

Design/methodology/approach

In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.

Findings

The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.

Research limitations/implications

This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.

Practical implications

This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.

Social implications

This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.

Originality/value

This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 5 April 2024

Rebecca Nana Yaa Ayifah and Adriana Apawo Adda

The rapid growth of the mobile money industry has been matched by a rise in mobile money fraud. The technology required to apprehend perpetrators of such fraud is nonexistent in…

Abstract

Purpose

The rapid growth of the mobile money industry has been matched by a rise in mobile money fraud. The technology required to apprehend perpetrators of such fraud is nonexistent in most developing countries. Hence, the need for individuals to be willing to pay for insurance against such frauds is crucial. This paper aims to examine individuals’ willingness to pay for insurance against mobile money fraud in Ghana.

Design/methodology/approach

The paper uses nationally representative data collected from 4,266 adults (persons 18 years and above) in Ghana. Individuals’ willingness to pay premiums for protection against mobile money fraud was elicited by a single-bound dichotomous choice and open-ended contingent valuation designs.

Findings

On average, 24.34% of Ghanaians are willing to pay premiums for insurance against mobile money frauds, with more men (26.37%) being willing than women (22.56%). Similarly, the average monthly premium that men are willing to pay for protection against mobile money fraud is GH¢32.16 (US$8.16), while that of women is GH¢22.5 (US$5.62). Furthermore, the results show that years of schooling, income, previous fraud experience, and using the accounts for saving are all positively associated with willingness to pay. However, using other networks apart from MTN has a negative association with willingness to pay.

Originality/value

To the best of our knowledge, this is the first study that examines willingness to pay for insurance against mobile money fraud. Thus, this is the first that estimate quantitatively how much mobile account holders will pay as premiums for insurance against mobile money fraud.

Details

Journal of Money Laundering Control, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 12 March 2024

Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…

Abstract

Purpose

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.

Design/methodology/approach

The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.

Findings

The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.

Originality/value

This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 14 August 2023

Olusola Joshua Olujobi and Tunde Ebenezer Yebisi

The purpose of this study is to examine the corruption prevalent in the distribution of COVID-19 palliatives during the lockdown and movement restrictions in the country. This…

Abstract

Purpose

The purpose of this study is to examine the corruption prevalent in the distribution of COVID-19 palliatives during the lockdown and movement restrictions in the country. This study seeks to analyse the current state of corruption in the distribution of COVID-19 palliatives and public health facilities in Nigeria while also providing a legal insight and strategic blueprint to combat corruption. To this end, this study will address the current legal framework for combating corruption and build upon this to formulate a working strategy for tackling corruption in the future.

Design/methodology/approach

Using a doctrinal legal research methodology, this study draws upon existing literature, tertiary data sources and information from the Nigeria Centre for Disease Control. The collected data is analysed and compared with current literature to identify key findings. Rent-seeking and utilitarian theories of the law were examined to guide this study. This study offers useful insights into combating corruption. The use of this method is justified, as it enhances the credibility of the findings on the importance of strategies for future emergencies. This legal research approach is consistent with the law and can be easily verified. The empirical aspect of this study involved a survey of multidimensional health-care and economic data set of 36 states in Nigeria plus the Federal Capital Territory on COVID-19 in Nigeria. A survey linearised regression model was estimated to determine the influence of government revenue and public health-care facilities in the control of the virus spread in Nigeria.

Findings

This study reveals the need for emphasis on the imperative of combating corruption in the distribution of COVID-19 palliatives and establishing economic resilience through transparent and accountable practices, supported by legal frameworks.

Research limitations/implications

Rent-seeking and utilitarian theories of law are evaluated because of their impacts on combating corruption. The limitation of this study is the intricacy of gathering data on COVID-19 palliatives corruption in Nigeria because of secrecy and the absence of reliable data on the subject.

Practical implications

Estimating the exact number of stolen palliatives and their fiscal impact on Nigeria's economy proves to be a formidable task because of the covert nature of corruption. This study equips policymakers in Nigeria with a better understanding of the legal challenges posed by corruption in the health care sector and provides an effective strategy to combat it.

Social implications

The lack of reliable data on the extent of palliative theft hinders the ability of lawmakers to enact effective legislation and strategies for combating corruption in the distribution of COVID-19 palliatives and addressing future emergencies in Nigeria. The policy implications of this study can assist policymakers in Nigeria and other countries in formulating measures to combat corruption in the distribution of COVID-19 palliatives and other future emergencies. Furthermore, it recommends the overhaul of anti-corruption laws and mechanisms in Nigeria to ensure effective measures against corruption.

Originality/value

In conclusion, this study contributes to knowledge by proposing a legal model centred on people's participation to enhance transparency and accountability in future palliative distribution processes. This study recommends legal strategies that can effectively address corruption in future emergencies or shocks. This study proposes a strategic blueprint to tackle corruption in the future. This blueprint includes an analysis of existing laws and regulations, as well as potential policy changes and legislative reform. This study also includes recommendations for improved enforcement and oversight mechanisms and for improved public awareness and education. As part of this, this study considers the potential for public–private partnerships to increase transparency and accountability in public health and health-care services.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 30 April 2024

Basit Abas

The objective of this study was to conduct a bibliometric analysis of the existing literature on organizational deviance to assess how far this concept has progressed since its…

Abstract

Purpose

The objective of this study was to conduct a bibliometric analysis of the existing literature on organizational deviance to assess how far this concept has progressed since its introduction in the domain of organizational behavior.

Design/methodology/approach

This study employs bibliometric methodologies (citation analysis, co-citation analysis and co-occurrence of author keywords) using VOSviewer. The Scopus database was used, as it is the largest database of scholarly literature.

Findings

The findings indicate the character and direction of organizational research over the past two decades. Organizational deviance due to psychological contract breach, organizational deviance in the context of organizational cynicism and organizational deviance in the context of psychological capital are the three major themes in the literature on organizational deviance. In addition, the study highlights the most significant authors, journals, institutions and nations in the field of value co-creation research as well as potential future research areas in this area.

Research limitations/implications

The use of a single database and the inability to contextualize the citation structure of papers revealed by the review are limitations of this study.

Originality/value

This study examines the structure of the literature on organizational deviance and charts the field's evolution over time.

Details

IIM Ranchi journal of management studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-0138

Keywords

1 – 10 of 124