Search results

1 – 10 of over 4000
Article
Publication date: 12 August 2022

Meenakshi Handa, Parul Ahuja and Swati Jain

Along with their immense benefit, online channels of communication and information-sharing also present a myriad set of challenges. The unauthorized downloading and sharing of…

Abstract

Purpose

Along with their immense benefit, online channels of communication and information-sharing also present a myriad set of challenges. The unauthorized downloading and sharing of copyrighted content such as music and movies is one such issue. This study aims to examine the factors related to the unauthorized downloading of content amongst young internet users in an emerging market.

Design/methodology/approach

An online structured questionnaire was used to collect primary data from 219 internet users between 17 and 24 years of age. The partial least squares structural equation modelling was used to analyse the primary data.

Findings

The study findings report that monetary savings and social influence are the main drivers underlying the propensity to engage in unauthorized downloading amongst young adults. Perceptions of harm caused to artists and producers appear to be a deterrent. Though the respondents perceive the quality of content downloaded from unauthorized sites to be less than desirable, and there is also a higher perceived threat from viruses, this does not appear to deter unauthorized downloading behaviour amongst this segment of consumers.

Research limitations/implications

Combating unauthorized downloading and other forms of questionable online behaviours is a challenge for multiple stakeholders. Consumption of unauthorized digital content is examined in the context of online consumers whose demographic profile is often associated with this category of questionable behaviour. The study adds to the extant understanding of the aetiology of what are often considered online unethical and illegal behaviours and makes both practical and theoretical contributions to the subject field.

Originality/value

The study examines an important aspect of rapidly evolving internet technologies. The internet provides a veil to individuals engaging in unethical online activities. Despite the existence of laws declaring these activities to be illegal, instances of copyright violations of music and movies abound. The insights regarding the drivers and deterrents of a form of online unauthorized activity are used to present a set of strategies aimed at addressing such behaviours.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 8 May 2009

Habib Mahama and Chen Yu Ming

Recent failures and scandals in the banking and financial services industry have served as catalysts for anxiety about operational risk. In particular, the Basel II accord…

3170

Abstract

Purpose

Recent failures and scandals in the banking and financial services industry have served as catalysts for anxiety about operational risk. In particular, the Basel II accord emphasises the need to develop methodologies for assessing and managing this category of risk. However, operational risk is said to be an elusive and problematic concept. This paper aims to examine how certain events in the banking and financial services industry become enframed and constructed as operational risk and how such risk is managed.

Design/methodology/approach

The paper draws on the sociology of risk literature to analyse how an “unauthorised trading” event (and associated losses) that occurred in the currency options trading desk of the National Australia Bank (NAB) was enframed and constructed as operational risk. Data are gathered through metadiscourse analysis of textual materials relating to this event.

Findings

The analysis reveals the social and institutional mechanisms underlying the construction of risk and the contested nature of risk knowledge. In particular, it highlights the significant role of media discourse in articulating risk claims and dominating public discourse about risk. It also highlights the moral character of the concept of risk and how the moralising of risk discourse leads to the creation of particular forms of subjectivities and the operationalisation of certain risk management rationalities in NAB.

Originality/value

The paper will be helpful in improving researchers' and practitioners' understanding of how, in a given field of possibilities, particular events become constructed as operational risk.

Details

Accounting, Auditing & Accountability Journal, vol. 22 no. 4
Type: Research Article
ISSN: 0951-3574

Keywords

Article
Publication date: 12 June 2024

Neha Chhabra Roy and Sreeleakha P.

This study addresses the ever-increasing cyber risks confronting the global banking sector, particularly in India, amid rapid technological advancements. The purpose of this study…

Abstract

Purpose

This study addresses the ever-increasing cyber risks confronting the global banking sector, particularly in India, amid rapid technological advancements. The purpose of this study is to de velop an innovative cyber fraud (CF) response system that effectively controls cyber threats, prioritizes fraud, detects early warning signs (EWS) and suggests mitigation measures.

Design/methodology/approach

The methodology involves a detailed literature review on fraud identification, assessment methods, prevention techniques and a theoretical model for fraud prevention. Machine learning-based data analysis, using self-organizing maps, is used to assess the severity of CF dynamically and in real-time.

Findings

Findings reveal the multifaceted nature of CF, emphasizing the need for tailored control measures and a shift from reactive to proactive mitigation. The study introduces a paradigm shift by viewing each CF as a unique “fraud event,” incorporating EWS as a proactive intervention. This innovative approach distinguishes the study, allowing for the efficient prioritization of CFs.

Practical implications

The practical implications of such a study lie in its potential to enhance the banking sector’s resilience to cyber threats, safeguarding stability, reputation and overall risk management.

Originality/value

The originality stems from proposing a comprehensive framework that combines machine learning, EWS and a proactive mitigation model, addressing critical gaps in existing cyber security systems.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 3 August 2021

Neha Chhabra Roy and Sankarshan Basu

Banks are exposed to many challenges to name a few i.e. growing market competition, political environment, market forces of demand and supply, technological changes, frauds and…

Abstract

Purpose

Banks are exposed to many challenges to name a few i.e. growing market competition, political environment, market forces of demand and supply, technological changes, frauds and poor management. The banking sector devasted experiences of fraud have impacted all facets of the Banking, Financial Services and Insurance. In continuation, this study aims to revolve around themes of different types of frauds, especially insider frauds that have gained mainstream attention in recent major value fraud events with prominent Indian banks. This study will identify the types and drivers of insider frauds.

Design/methodology/approach

The methodology opted for the study is through confidential primary survey and focused group discussion with risk officers of banks who are associated with Indian banks for more than three years, further to understand the relation between type of Insider frauds and originating drivers were paired based on the principal component analysis.

Findings

Finally, the paper concludes with the conceptual mitigation framework for different types of insider fraud and driver pairs within the scope of this paper. This paper thought will support policymakers of the Indian banking system to create a more robust environment within the banking system via timely detection of frauds so that up to an extent it can be squared before it appears.

Originality/value

The study is innovative in the area of banks’ internal fraud management, where original data collected through a primary survey contributes to the conclusion of fraud management for various Indian banks.

Details

Journal of Facilities Management , vol. 19 no. 4
Type: Research Article
ISSN: 1472-5967

Keywords

Article
Publication date: 13 May 2022

Meenakshi Handa and Parul Ahuja

The internet has provided a gamut of benefits to consumers. The digital world, however, also provides space for various illegal or unethical consumer activities. Consumers may not…

Abstract

Purpose

The internet has provided a gamut of benefits to consumers. The digital world, however, also provides space for various illegal or unethical consumer activities. Consumers may not always be fully aware of the unethical or illegal nature of some of the online activities that they engage in. This study aims to examine the questionable side of online consumer behaviour in an emerging market where internet penetration and smart phone accessibility is rapidly expanding. Using a third-person technique, this study attempts to empirically capture the perceptions of Indian adults regarding the prevalence of various questionable online activities such as unauthorized downloading of digital content, spreading fake news/misinformation and fraudulent returns and to understand the extent to which these respondents believe that such actions are acceptable or illegal and unethical.

Design/methodology/approach

An online questionnaire was used to collect primary data from 212 consumers. Non-probability convenience and snowball sampling was used for the purpose.

Findings

Unauthorized watching or downloading of online content is reported to be the most prevalent among the various types of questionable behaviours examined. However, it is behaviours such as fraudulent returns and spreading misinformation through online channels which are considered to be the most unethical or illegal. Certain behaviours which may be deemed to be unethical and illegal nevertheless are seen as acceptable. Significant differences between demographics in the case of several of the unethical activities are reported.

Research limitations/implications

This study examines the grey and dark side of online behaviours among consumers in an emerging market and points to the need for action on several fronts to increase consumer awareness and sensitivity about the unethical or illegal nature of some of their online activities and the implications for multiple stakeholders. Based on the findings of this study, recommendations directed at consumers, marketers and policymakers are discussed.

Originality/value

Although the benefits of online communication channels have been extensively studied, their ability to facilitate certain unethical and even illegal activities is an under-researched area. The inclination to engage in these types of questionable behaviours may have been exacerbated by the restrictions imposed by the COVID-19 pandemic. This study highlights the importance of research on various grey consumer activities in the digital space and paves the way for further investigations by identifying online actions which are considered as most prevalent and/or unethical and illegal.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 8 May 2009

Joanna Gray

The purpose of this paper is to report and comment on the High Court ruling on recoverability of claimants' losses arising from unauthorised insurance activity.

298

Abstract

Purpose

The purpose of this paper is to report and comment on the High Court ruling on recoverability of claimants' losses arising from unauthorised insurance activity.

Design/methodology/approach

The paper outlines the facts surrounding the case and comments on the decision.

Findings

The court pointed out that the issues that fell to be determined were all law and principle and not of fact.

Originality/value

The paper highlights how this was the first occasion that the courts had had cause to consider the effect of some key provisions of Financial Services and Markets Act 2000 that relate to the enforceability and redress position in the context of unauthorised insurance business.

Details

Journal of Financial Regulation and Compliance, vol. 17 no. 2
Type: Research Article
ISSN: 1358-1988

Keywords

Article
Publication date: 12 September 2008

Henry A. Davis

The purpose of this paper is to provide excerpts of selected Financial Industry Regulatory Authority (FINRA) Regulatory Notices issued from April to June 2008 and a sample of…

Abstract

Purpose

The purpose of this paper is to provide excerpts of selected Financial Industry Regulatory Authority (FINRA) Regulatory Notices issued from April to June 2008 and a sample of disciplinary actions during that period.

Design/methodology/approach

The paper provides excerpts from FINRA Regulatory Notice 08‐16, Third Party Research Reports; 08‐17, Customer Complaint Reporting; 08‐18, Unauthorized Proprietary Trading; 08‐21, Partial Redemption of Auction Rate Securities; 08‐22, Definition of Public Arbitrator; 08‐27, Midleading Communications about Expertise; 08‐30, Illiquid Investments; 08‐31, Trading Ahead of Customer Orders; and 08‐33, Minor Rule Violation Plan Amendment.

Findings

Useful information may be found in each of these notices.

Originality/value

The paper provides direct excerpts designed to provide a useful digest for the reader and an indication of regulatory trends. The FINRA staff is aware of this summary but has neither reviewed nor edited it.

Details

Journal of Investment Compliance, vol. 9 no. 3
Type: Research Article
ISSN: 1528-5812

Keywords

Article
Publication date: 1 April 2006

Robert Willison

While a number of IS security researchers consider the threat posed by employees who perpetrate computer crime, there is currently a lack of insight into how the offender…

2166

Abstract

Purpose

While a number of IS security researchers consider the threat posed by employees who perpetrate computer crime, there is currently a lack of insight into how the offender interacts with the criminal context both prior to and during commission. A greater understanding of this relationship may complement existing security practices by possibly highlighting new areas for safeguard implementation. To help facilitate a greater understanding of the offender/environment dynamic, this paper, therefore, aims to assess the feasibility of applying three criminological theories to the IS security context. Rather than focusing on why people become criminals, these theories entitled routine activity theory, environmental criminology and the rational choice perspective, focus on the criminal act.

Design/methodology/approach

Drawing on an account of the Barings Bank collapse, events highlighted in the case study are used to assess whether concepts central to the theories are supported by the data.

Findings

Analysis indicates support for the concepts central to environmental criminology and the rational choice perspective. While case study evidence supports two of the concepts advanced by routine activity theory, as a whole the theory is found wanting, as the “guardianship” and “handled offender” concepts appear to lack the necessary sophistication to theoretically accommodate and explain supervisory and control failings cited in the case study.

Research limitations/implications

While future research could encompass continued application of the theories to further assess their suitability for the IS domain, consideration could also be given to the application of the preventive tools and methods which have been developed in tandem with the three criminological approaches. Another stream of future research may involve the application of the theories in conjunction with existing security practices.

Practical implications

Greater knowledge of the offender/context dynamic may feasibly enhance existing security practices by possibly highlighting new areas for safeguard implementation.

Originality/value

From an IS security perspective, there is currently a lack of insight into the offender/context dynamic. The paper presents a group of criminological theories, which have previously not been considered for application in the IS context. The theories may feasibly throw light on the behaviour of offenders in the criminal context, both prior to and during commission.

Details

Information Technology & People, vol. 19 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 May 2001

Lawrence W.C. Lai and Daniel C.W. Ho

Extending the ground works of Ho (1993), Baldwin (1994), Walters and Hastings (1998a, 1998b) on property management in Hong Kong, this short paper documents the context[1] of…

1792

Abstract

Extending the ground works of Ho (1993), Baldwin (1994), Walters and Hastings (1998a, 1998b) on property management in Hong Kong, this short paper documents the context[1] of research on illegal structures, explains the incentive for building illegal structures on government land and private property and discusses the significance of illegal structures for the proprietor and the property manager, as well as the relevant legislative provisions and policies.

Details

Property Management, vol. 19 no. 2
Type: Research Article
ISSN: 0263-7472

Keywords

Article
Publication date: 1 May 1995

Matthew K. O. Lee

One of the main aims of information systems security (ISS) is toprevent unauthorized access to and tampering with information systemsresources. In April 1993 the first ever…

1644

Abstract

One of the main aims of information systems security (ISS) is to prevent unauthorized access to and tampering with information systems resources. In April 1993 the first ever computer crime legislation came into existence in Hong Kong. Issues relating to computer fraud, hacking, and other types of threats to ISS are addressed by the legislation. As a legislative tool used in the control of computer crime, the Hong Kong experience is worth examining because it is the first major effort of this kind in the important and fast growing Far East region. In critically examining this legislation and its implications on ISS management, contributes towards a better understanding of the regulatory control of computer crime and its policy implications. Makes comparisons with countries which have a longer history of computer crime control.

Details

Information Management & Computer Security, vol. 3 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of over 4000