35 research outputs found

    Critical success factors for preventing E-banking fraud

    Get PDF
    E-Banking fraud is an issue being experienced globally and is continuing to prove costly to both banks and customers. Frauds in e-banking services occur as a result of various compromises in security ranging from weak authentication systems to insufficient internal controls. Lack of research in this area is problematic for practitioners so there is need to conduct research to help improve security and prevent stakeholders from losing confidence in the system. The purpose of this paper is to understand factors that could be critical in strengthening fraud prevention systems in electronic banking. The paper reviews relevant literatures to help identify potential critical success factors of frauds prevention in e-banking. Our findings show that beyond technology, there are other factors that need to be considered such as internal controls, customer education and staff education etc. These findings will help assist banks and regulators with information on specific areas that should be addressed to build on their existing fraud prevention systems

    STRESS FROM INTERNET FRAUD AND ONLINE SOCIAL SUPPORT

    Get PDF
    This exploratory research attempts to fill the literature gap by investigating ordinary user’s response to Internet transaction fraud and examining the types of online social support. We adapt the stress process model from the psychology literature and apply it to the context of Internet fraud. Moreover, we propose a conceptual online social support model for Internet fraud. We argue that there are two types of support mechanisms – factual information exchange and emotional support. In addition to proposing the above two conceptual models, we conduct two preliminary qualitative case studies. First, we report a case of eBay fraud and perform in-depth analysis of the victims’ belief, emotion and behavior response to a fraud in light of the stress process model. Second, we present a threaded discussion on eBay Community Answer Center, which is about money wire transfer fraud. We show that the reply sentences convey either information exchange or emotional support

    An Ounce of Prevention – Understanding the role of IS in ending Interpersonal Violence

    Get PDF
    This paper presents the findings of an investigation into the role of social technologies in violence prevention non-profitorganizational networks. The research was conducted with the cooperation of a partner organization that serves as aknowledge hub connecting various providers of services related to the treatment and prevention of instances of interpersonalviolence. From our time working with this project we developed the SASA (Share and Share Alike) Framework of SustainedKnowledge sharing among non-profit partner networks. This paper presents an overview of the SASA framework anddiscusses its role in facilitating the creation of a sustainable knowledge contribution network for non-profit service providers

    Internet Fraud: Information for Teachers and Students

    Get PDF
    Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing opportunities for fraudsters while at the same time placing more unsuspecting internet users at risk of falling prey to these schemes. There exists a thriving economy online with large sums of money changing hands online. It is therefore important for any internet user to easily identify when they are exposed to internet fraud schemes and as such avoid being a victim

    Current State of the Digital Deception Studies in IS

    Get PDF
    Digital deceptions exist on the Internet in various forms and for different purposes. The purpose of this study is to understand the current state of the digital deception research in IS discipline. Based on our review and analysis of the selected digital deception articles published in IS journals and conference proceedings, we discussed various perspectives of digital deceptions, such as the media, types of deception, deceivers, motivations, and victims. The results of our study indicate that deception phenomena are severely under-researched in IS discipline. The study provides suggestions for future research

    Intended Deception in the Virtual World

    Get PDF
    This study explores how people intend to deceive in the virtual world. Previous research has focused the intent and behavior of online deception, but has rarely looked into specific aspects of online deception including strategy, magnitude, and seriousness. We answered research questions about people’s selection of deception strategies, perceived seriousness of deception, and magnitude of deception in the virtual world via a survey study. Additionally, we examined possible influence of age and gender on deception. The findings are interesting and offer implications for designing deception detection strategies

    THE INFLUENCE OF PRICE DISPERSION ON PURCHASE INTENTION IN CHINESE ONLINE C2C MARKET: A TRUST PERSPECTIVE

    Get PDF
    Chinese C2C market grows rapidly. However, it is plagued by serious trust fraud problems. The level of price dispersion in C2C platforms is relatively high. The mixed interaction between “lemons market” problem and high level of price dispersion makes it hard for buyers to identify trustworthy sellers with low price. We are interested in the generation of initial trust and purchase intention when the buyers search a product and receive a list of widely distributed prices, rather than a list of narrowly distributed prices. However, limited knowledge can be gained from previous studies regarding this issue. This study puts forward a theoretical model to explain how price dispersion interacts with other important factors in C2C purchase (e.g. initial trust, perceived risk, perceived value and purchase intention). Product type (high- touch/low-touch) is taken into consideration as well since the level of uncertainty faced by buyers is different. A proposal for experiment is described. This research-in-progress has the potential to lead to various theoretical and practical implications. For example, the results will enhance the literature on trust, help buyers do better purchase decision, assist sellers in designing pricing strategy, and be utilized by platforms to propose new mechanisms

    Exploiting Emotions in Social Interactions to Detect Online Social Communities

    Get PDF
    The rapid development of Web 2.0 allows people to be involved in online interactions more easily than before and facilitates the formation of virtual communities. Online communities exert influence on their members’ online and offline behaviors. Therefore, they are of increasing interest to researchers and business managers. Most virtual community studies consider subjects in the same Web application belong to one community. This boundary-defining method neglects subtle opinion differences among participants with similar interests. It is necessary to unveil the community structure of online participants to overcome this limitation. Previous community detection studies usually account for the structural factor of social networks to build their models. Based on the affect theory of social exchange, this research argues that emotions involved in social interactions should be considered in the community detection process. We propose a framework to extract social interactions and interaction emotions from user-generated contents and a GN-H co-training algorithm to utilize the two types of information in community detection. We show the benefit of including emotion information in community detection using simulated data. We also conduct a case study on a real-world Web forum dataset to exemplify the utility of the framework in identifying communities to support further analysis

    Addressing Levels Issues in IS Qualitative Research

    Get PDF

    A Generic Theory of Authentication to Support IS Practice and Research

    Get PDF
    This paper addresses a yawning gap in IS theory and practice. In the information systems (IS) discipline and profession, the concept of authentication is commonly limited in scope to the checking of assertions relating to identity. The effective conduct of organised activities depends on the authentication of not only assertions of those kinds, but also many other categories of assertion. The paper declares its metatheoretic assumptions, and outlines a pragmatic metatheoretic model whose purpose is to establish a workable framework for IS practitioners, and for researchers oriented to IS practice. Within this frame, a generic theory of authentication is proposed, encompassing not only commonly discussed kinds of assertions, but also other important categories relating to real-world properties, asset-value and content-integrity. This surfaces unaddressed opportunities for IS researchers in content-integrity authentication at the semantic level, relating to assertions of fact
    corecore