14 research outputs found

    Investigating Identity Fraud Management Practices in E-tail sector:A Systematic Review

    Get PDF
    Purpose: Identity fraud is a growing issue for online retail organisations. The literature on this issue is scattered, and none of the studies presents a holistic view of identity fraud management practices in the online retail context. Therefore, the purpose of this paper is to investigate the identity fraud management practices and present a comprehensive set of practices for e-tail sector. Design/methodology/approach: A systematic literature review approach was adopted, and the articles were selected through pre-set inclusion criteria. The authors synthesised existing literature to investigate identity fraud management in e-tail sector. Findings: The research finds that literature on practices for identity fraud management is scattered. The findings also reveal that firms assume identity fraud issues as a technological challenge, which is one of the major reasons for a gap in effective management of identity frauds. This research suggests e-tailers to deal this issue as a management challenge and counter strategies should be developed in technological, human and organisational aspects. Research limitations/implications: This study is limited to the published sources of data. Studies, based on empirical data, will be helpful to support the argument of this study; additionally, future studies are recommended to include a wide number of databases. Practical implications: This research will help e-tail organisations to understand the whole of identity fraud management and help them develop and implement a comprehensive set of practices at each stage, for effective management identity frauds. Originality/value: This research makes unique contributions by synthesising existing literature at each stage of fraud management and encompasses social, organisational and technological aspects. It will also help academicians understanding a holistic view of available research and opens new lines for future research.</p

    Explaining online communities’ contribution to socio-economic development

    Get PDF
    In recent times, online communities are emerging as a potential source of information technology-led socio-economic development by enabling new generative mechanisms. Existing studies provide useful insights yet do not recognize the contributions of online communities in achieving socio-economic development. To address this knowledge gap, this paper documents a netnography study conducted on an online community for teaching the youth how to earn income online legitimately. We applied the theoretical notion of IT affordances to examine the possibilities for socio-economic action via online communities in the context of a developing country. Preliminary findings show how the online community contributes to socio-economic development by fostering collaboration, information sharing, and learning leading to income generation

    A TAXONOMY OF MACHINE LEARNING-BASED FRAUD DETECTION SYSTEMS

    Get PDF
    As fundamental changes in information systems drive digitalization, the heavy reliance on computers today significantly increases the risk of fraud. Existing literature promotes machine learning as a potential solution approach for the problem of fraud detection as it is able able to detect patterns in large datasets efficiently. However, there is a lack of clarity and awareness on which components and functionalities of machine learning-based fraud detection systems exist and how these systems can be classified consistently. We draw on 54 identified relevant machine learning-based fraud detection systems to address this research gap and develop a taxonomic scheme. By deriving three archetypes of machine learning-based fraud detection systems, the taxonomy paves the way for research and practice to understand and advance fraud detection knowledge to combat fraud and abuse

    Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry

    Get PDF
    The cybersecurity market is the fastest growing market in the United States; as such, leaders in financial institutions recognize their businesses are vulnerable, as money is accessible within computerized banking systems. The purpose of this multiple case study was to explore what strategies financial service leaders- use to recruit cybersecurity professionals. The conceptual framework for this study was the hierarchy of needs and stakeholder management theory. Data collection involved company archival documents and semistructured, open-ended interviews with 5 financial service leaders in the Midlands area of South Carolina who recruited skilled cybersecurity professionals to support long-term business sustainability. Coding, clustering, and theme development evolved through coding key words and actions, drawing ideas together into clusters, and evolving the prominent ideas into themes. During data analysis, the theoretical propositions underwent a sequential process, which included coding the data by hand. The use of member checking and methodological triangulation increased the trustworthiness of the study. Analysis revealed 3 themes: increased training, broadened social networking, and improved communication. Financial service leaders can use training to educate and recruit new cybersecurity professionals. Also, findings suggest the need for training to improve social networking and communicate as a team to increase profitability. The findings from this study may contribute to social change by helping business owners recruit skilled professionals to prevent or reduce cybersecurity threats

    Identity Fraud Management: A Qualitative Study into the Managerial Practices in E-tail Sector

    Get PDF
    E-commerce has offered many opportunities to business firms to minimise their operational costs, enhance the customer base and develop better customer relationships. These opportunities have also created some challenges, especially those related to identity frauds. Therefore, this study aims at understanding identity fraud management and analyses existing managerial practices at large e-tailers to suggest improvements. To attain the objectives of this study, the qualitative approach of data collection was adopted. The interview method of data collection helped to get in-depth information about the context under study. The case study research approach was chosen to investigate the what, how and why of the issues and practices of identity fraud management. The data were collected at three large e-tailers based in the UK, in the course of 33 semi-structured interviews. For the analysis, thematic approach was adopted and the results were processed using single and cross-case analysis. The findings revealed that identity fraud was one of the biggest challenges for e-tailers, as they are losing a significant amount of their revenues. Various types and methods of identity frauds have been explored. The results show that the case firms have the process of managing identity frauds, and the stages of fraud management suggested by Wilhelm (2004) were present. It was also found that e-tailers prioritised the technological aspects of fraud management, while the developing the skills and awareness of their staff was not given required focus, which may be one of the possible reasons for the existing deficiencies in fraud management. In fact, this study has found that human factor is a critical aspect of fraud management. It has also been established that customer education is not carried out effectively, despite the fact that identity theft mostly occurs at the customer side. A more active and explicit stance against identity fraud is recommended. However, because the e-tailers operate in a highly competitive environment, there is a trade-off between putting up extra security layers and the ease for customers for making a purchase, making identity fraud management ever more challenging for them. Present study contributes to the body of literature by understanding identity fraud management and analysing current managerial practices at large e-tailers. Reflecting on the theoretical and empirical data, e-tailers are forwarded some novel practices for better management of identity frauds. Additionally, e-tailers are also suggested improvements in existing managerial practices. This study may help e-tailers to effectively manage identity frauds, which will result in reduced fraud losses, better firm image and favourable customer relations and offering the society a secure environment for online shopping. Finally, a conceptual framework has been suggested for effective management of identity frauds in e-tail context. Managerial practices are suggested and guidelines are given at each stage of the framework for effective management of identity frauds

    Determinants of ICT adoption by small and medium enterprises in Pietermaritzburg.

    Get PDF
    Masters Degree. University of KwaZulu-Natal, Pietermaritzburg.Information and Communication Technology (ICT) has been a major contributor to world economic growth. ICT plays a vital role when it comes to the growth of Small and Medium Enterprises (SMEs). In developed countries, SMEs are making use of ICTs to support their business functions although this has not been the case in most developing countries. The Global Entrepreneurship Monitor (GEM) argues that the survival rate of start-up businesses is generally poor with SMEs in developing countries performing even worse than the standard survival rates. ICT can be used as a tool to improve the performance and survival rate of SMEs in developing countries. SMEs in developing countries are lacking behind when it comes to the adoption of ICT. This study aims to investigate the determinants that influence the intention to adopt ICT by SMEs in Pietermaritzburg, South Africa. The study made use of quantitative methods as its fundamental research approach. 227 SME owners in Pietermaritzburg were surveyed using a closed-ended questionnaire. The Technology, Organisation and Environment framework was used as a lens through which to understand the study. The TOE theoretical framework is largely used as a process to study the adoption of innovation at a firm level. Structural Equation Modelling (SEM) approach was applied in order to analyse the data from the respondents. The study revealed that Technology Context and Organisation Context (-0.221) are significant determinants that influence the intention to adopt ICT amongst SMEs. Technology Context is the most influential determinant with a regression weight of 0.938, and the Environment Context is an insignificant determinant due to the lack of government support. The study contributes towards the understanding on the important determinants that influences the adoption of ICTs in Pietermaritzburg. The results of this study can assist service providers and government on how to help uplift SMEs. It further shines the light on the lack of the government support towards SMEs.List of Abbreviations on page iv
    corecore