Search results

1 – 10 of 281
Article
Publication date: 11 May 2023

Alexander Joseph Vanhee and Rachel McNealey

The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate…

Abstract

Purpose

The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate whether aspects of an individual’s residence affect their likelihood of becoming identity theft victims.

Design/methodology/approach

The authors conduct logistic regressions of whether a respondent was an identity theft victim in the past year using the following variables as key predictors: number of housing units in a residence, whether the respondent operates a business out of their residence and if residence access is restricted.

Findings

The results suggest that location influences the likelihood of identity theft to a modest degree though some aspects of location (possibly those related to rewards perceptions) may be more relevant than others. Meanwhile, though location may influence initial target selection, whether someone is victimized may be more dependent on factors such as personal behavior.

Originality/value

To the best of the authors’ knowledge, this manuscript represents one of the first investigations into the relationship between microlevel place and the incidence of identity theft. Furthermore, it provides evidence that one does exist which bears further inquiry.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 3 May 2024

Matt Dingler

Scholarship on America’s K-12 economics curriculum reveals an inattention to many harmful economic realities, specifically wealth inequality. Critics of the present curriculum…

Abstract

Purpose

Scholarship on America’s K-12 economics curriculum reveals an inattention to many harmful economic realities, specifically wealth inequality. Critics of the present curriculum posit that its emphasis on out-dated concepts and models ignores crucial elements of reality that impact economic interaction and identities. In response to the dominant economic paradigm and methods, this practitioner-focused paper discusses an economically pluralist, pedagogically critical approach to interrogating destructive economic realities. It details how three social studies classroom simulations based on the board game Monopoly may be integrated with certain informational texts to explore economic factors that contribute to America’s unique form of wealth inequality.

Design/methodology/approach

This paper describes wealth inequality in America and rationalizes the need to make this social problem a focus of study in the secondary social studies classroom. First, I survey the present curricular apparatus of K-12 economics education and then argue for a pluralist approach that expands the curriculum’s dominant neoclassical paradigm. Connecting economic pluralism to critical citizen education, I draw upon emerging critical economic citizen education scholarship to explain attendant pedagogical and instructional approaches. The described lesson builds upon a tradition of Monopoly simulations, is rooted in critical citizen education pedagogy and aligns with Soroko’s (2023) critical economic literacy framework.

Findings

This paper progresses the curricular movement of economic pluralism through its critique of America’s current K-12 economics curriculum that does not focus on immediate, lived social problems. It further defines critical economics, citizenship and pedagogy, then details an instructional practice that employs critical disciplinary tools to investigate contributing factors of American wealth inequality.

Originality/value

This paper contributes to the growing field of pluralist economic perspectives and pedagogies. Specifically, it enriches understanding of critical economics citizenship education by further defining attendant pedagogy and explaining Monopoly as an instructional tool for critical economics citizen education. Previous works have discussed Monopoly’s utility for teaching various concepts within the social studies disciplines. This simulation lesson is unique in its instructional approach that merges simulation experiences with certain informational texts to cultivate critical economic knowledge of American wealth inequality and critical economic skills for critiquing and transforming oppressive economic realities.

Details

Social Studies Research and Practice, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1933-5415

Keywords

Article
Publication date: 17 April 2024

Jessica Rene Peterson, Kyle C. Ward and Michaela Lawrie

The purpose is to understand how farmers in rural American communities perceive crime, safety and policing.

Abstract

Purpose

The purpose is to understand how farmers in rural American communities perceive crime, safety and policing.

Design/methodology/approach

An online survey, adapted from a version used in Victoria, Australia (Harkness, 2017), was modified and administered through social media and farming organizations throughout three US states. The survey covers topics relating to crime and victimization, feelings of safety or fear in rural areas, policing practices and trust in police in their areas and any crime prevention practices that respondents use.

Findings

With nearly 1,200 respondents and four scales investigated, results indicate that those respondents with more favorable views of law enforcement and the criminal justice system had the highest fear of crime, those who had been prior victims of crime had a higher fear of crime than those who did not, those with higher community involvement had higher fear of crime, and those from Nebraska compared to Colorado had higher fear of crime.

Research limitations/implications

A better understanding of the agricultural community’s perceptions of crime, safety and policing will aid law enforcement in community policing efforts and in farm crime investigation and prevention. Limitations of the study, including the distribution method will be discussed.

Originality/value

Farm- and agriculture-related crimes have serious financial and emotional consequences for producers and local economies. Stereotypes about rural areas being “safe with no crime” are still prevalent. Rural American farmers’ perceptions of crime, safety and police are largely absent from the literature and are important for improving farm crime prevention.

Details

Policing: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 28 February 2024

Yoonjae Hwang, Sungwon Jung and Eun Joo Park

Initiator crimes, also known as near-repeat crimes, occur in places with known risk factors and vulnerabilities based on prior crime-related experiences or information…

117

Abstract

Purpose

Initiator crimes, also known as near-repeat crimes, occur in places with known risk factors and vulnerabilities based on prior crime-related experiences or information. Consequently, the environment in which initiator crimes occur might be different from more general crime environments. This study aimed to analyse the differences between the environments of initiator crimes and general crimes, confirming the need for predicting initiator crimes.

Design/methodology/approach

We compared predictive models using data corresponding to initiator crimes and all residential burglaries without considering repetitive crime patterns as dependent variables. Using random forest and gradient boosting, representative ensemble models and predictive models were compared utilising various environmental factor data. Subsequently, we evaluated the performance of each predictive model to derive feature importance and partial dependence based on a highly predictive model.

Findings

By analysing environmental factors affecting overall residential burglary and initiator crimes, we observed notable differences in high-importance variables. Further analysis of the partial dependence of total residential burglary and initiator crimes based on these variables revealed distinct impacts on each crime. Moreover, initiator crimes took place in environments consistent with well-known theories in the field of environmental criminology.

Originality/value

Our findings indicate the possibility that results that do not appear through the existing theft crime prediction method will be identified in the initiator crime prediction model. Emphasising the importance of investigating the environments in which initiator crimes occur, this study underscores the potential of artificial intelligence (AI)-based approaches in creating a safe urban environment. By effectively preventing potential crimes, AI-driven prediction of initiator crimes can significantly contribute to enhancing urban safety.

Details

Archnet-IJAR: International Journal of Architectural Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2631-6862

Keywords

Article
Publication date: 23 January 2024

Shreya Sangal, Gaurav Duggal and Achint Nigam

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud…

Abstract

Purpose

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud, money laundering, ransomware attacks, firearms, drug tracking, cyberattacks, identity theft and scams.

Design/methodology/approach

The authors conducted a review of studies related to illegal activities using blockchain from 2015 to 2023. Next, a thematic review of the literature was performed to see how these illegal activities were conducted using BCT.

Findings

Through this study, the authors identify the relevant themes that highlight the major illegal activities performed using BCT, its possible steps for prevention and the opportunities for future developments. Finally, the authors provide suggestions for future research using the theory, context and method framework.

Originality/value

No other research has synthesized the illegal activities using BCT through a thematic approach to the best of the authors’ knowledge. Hence, this study will act as a starting point for future research for academic and technical practitioners in this area.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 7 May 2024

Babatunde Moses Ololade

The purpose of this study is to determine the strategy adopted by small- and medium-scale enterprise (SME) owners in setting up internal control systems, examine the relationship…

Abstract

Purpose

The purpose of this study is to determine the strategy adopted by small- and medium-scale enterprise (SME) owners in setting up internal control systems, examine the relationship between the numbers of employees’ fraud and strategy adopted in setting up internal control and evaluate the difference between proactive and reactive strategies in employee’s fraud prevention among SMEs.

Design/methodology/approach

A survey research approach was adopted to determine whether proactive or reactive strategies were adopted by the SME owners. Specifically, a survey questionnaire was used to gather primary data from selected respondents in Lagos and Oyo States. Descriptive statistics, Spearman correlation and the Mann–Whitney test were used to analyse the primary data.

Findings

The study found that most of the SME owners used reactive internal control strategies in setting up their internal control systems after they suffered financial losses occasioned by employees’ fraud. Also, the study found a positive relationship between the number of employees’ fraud and reactive strategy. Finally, the study found a significant difference in the number of employees’ fraud occurrences between proactive and reactive internal control strategies in SMEs.

Research limitations/implications

The study provides further confirmation that where internal control is properly set up and strengthened, a lower number of employee frauds will occur. Thus, giving credence to the fraud theory. The study was, however, conducted in six selected local government areas in two states.

Practical implications

The study provides recommendations on the adoption of a proactive strategy for curbing employees’ fraud at the onset of business operations and not until devastating events of employees’ fraud become a reality.

Originality/value

The study is original, as it focuses on the strategy adopted by SME owners in setting up internal control systems, which is rare in fraud empirical studies, particularly for studies conducted in emerging markets like Nigeria. It provides the need for the sustainability of SMEs as engine of growth and employment through the adoption of appropriate strategies in setting up internal control systems.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 20 July 2023

Kenyth Alves de Freitas, Barbara Bechler Flynn, Ely Laureano Paiva and Amrou Awaysheh

This paper investigates how companies become resilient to supply chain (SC) piracy through using transactional and relational governance mechanisms to develop strategies effective…

Abstract

Purpose

This paper investigates how companies become resilient to supply chain (SC) piracy through using transactional and relational governance mechanisms to develop strategies effective in environments characterized by weak regulative institutions and mistrust.

Design/methodology/approach

This study developed case studies of nine large manufacturers with operations in Brazil.

Findings

The companies employed transactional and relational governance mechanisms to learn from past incidents, anticipate, and respond to the threat of SC piracy, becoming more resilient over time. Transactional governance mechanisms reduced risk triggers through technology, while relational governance mechanisms enhanced trust between SC and non-SC members, allowing the members to build social capital.

Practical implications

The authors provide practical guidance for managers and policymakers in developing risk management strategies based on technology and collaboration to reduce SC piracy in environments characterized by mistrust.

Social implications

SC piracy is a serious problem for global operations and SCs in many low-cost manufacturing locations. Besides the cost and service level consequences, the authors also highlight worker safety consequences, including the potential for kidnapping, psychological trauma, injuries, and death.

Originality/value

This study focuses on the little-researched topic of SC piracy. The authors examine the negative effects of a weak institutional environment, while most prior research focuses on the positive effects of a strong institutional environment. The authors position transactional and relational governance mechanisms as essential elements of SC risk resilience.

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

21

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. 30 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 2 February 2024

Alireza Moghayedi, Kathy Michell, Karen Le Jeune and Mark Massyn

Safety and security (S&S) are critical concerns in South Africa, especially in Cape Town, one of the country’s most crime-ridden cities. The University of Cape Town (UCT)…

Abstract

Purpose

Safety and security (S&S) are critical concerns in South Africa, especially in Cape Town, one of the country’s most crime-ridden cities. The University of Cape Town (UCT), situated on a large, open campus, has experienced increased malefaction. Facilities management (FM) services at universities bear the primary responsibility for providing S&S to their communities. To comprehensively understand and address the community’s demands regarding S&S, the current study was conducted to investigate the challenges specific to open universities. This study aims to determine whether implementing community-based FM (CbFM) principles and using technological innovations could offer a more effective and sustainable solution.

Design/methodology/approach

The study adopted interpretivist overarching case study methodology, which is ontologically based. A mixed-method approach was used to incorporate the strengths and limitations of the weaknesses of both methods. The data collection took the form of an online survey of the university community and semi-structured interviews with university executive management to obtain data from the single case study of UCT. Descriptive statistics were used to analyze the quantitative data, and thematic analysis was used to identify emergent themes from the qualitative data.

Findings

The study presents an overall view of the provision of S&S at UCT, the unique challenges faced by management and the main S&S issues affecting the community. Moreover, the study reveals that UCT has implemented community participation processes in the past with limited success. This is because the strategies implemented constitute a narrow perspective of community participation. Therefore, a much smarter and more inclusive perspective using technological innovation is required for successful community participation to occur and to be successfully used in providing S&S toward achieving future-proofing facilities.

Originality/value

This research has demonstrated the influence of CbFM and innovative technologies on the S&S of the open campus. Hence, future-proof facilities can be achieved when FM actively engages university communities in managing campuses through technological innovation.

1 – 10 of 281