19 research outputs found

    Investigating Identity Fraud Management Practices in E-tail sector:A Systematic Review

    Get PDF
    Purpose: Identity fraud is a growing issue for online retail organisations. The literature on this issue is scattered, and none of the studies presents a holistic view of identity fraud management practices in the online retail context. Therefore, the purpose of this paper is to investigate the identity fraud management practices and present a comprehensive set of practices for e-tail sector. Design/methodology/approach: A systematic literature review approach was adopted, and the articles were selected through pre-set inclusion criteria. The authors synthesised existing literature to investigate identity fraud management in e-tail sector. Findings: The research finds that literature on practices for identity fraud management is scattered. The findings also reveal that firms assume identity fraud issues as a technological challenge, which is one of the major reasons for a gap in effective management of identity frauds. This research suggests e-tailers to deal this issue as a management challenge and counter strategies should be developed in technological, human and organisational aspects. Research limitations/implications: This study is limited to the published sources of data. Studies, based on empirical data, will be helpful to support the argument of this study; additionally, future studies are recommended to include a wide number of databases. Practical implications: This research will help e-tail organisations to understand the whole of identity fraud management and help them develop and implement a comprehensive set of practices at each stage, for effective management identity frauds. Originality/value: This research makes unique contributions by synthesising existing literature at each stage of fraud management and encompasses social, organisational and technological aspects. It will also help academicians understanding a holistic view of available research and opens new lines for future research.</p

    Identity Fraud Management: A Qualitative Study into the Managerial Practices in E-tail Sector

    Get PDF
    E-commerce has offered many opportunities to business firms to minimise their operational costs, enhance the customer base and develop better customer relationships. These opportunities have also created some challenges, especially those related to identity frauds. Therefore, this study aims at understanding identity fraud management and analyses existing managerial practices at large e-tailers to suggest improvements. To attain the objectives of this study, the qualitative approach of data collection was adopted. The interview method of data collection helped to get in-depth information about the context under study. The case study research approach was chosen to investigate the what, how and why of the issues and practices of identity fraud management. The data were collected at three large e-tailers based in the UK, in the course of 33 semi-structured interviews. For the analysis, thematic approach was adopted and the results were processed using single and cross-case analysis. The findings revealed that identity fraud was one of the biggest challenges for e-tailers, as they are losing a significant amount of their revenues. Various types and methods of identity frauds have been explored. The results show that the case firms have the process of managing identity frauds, and the stages of fraud management suggested by Wilhelm (2004) were present. It was also found that e-tailers prioritised the technological aspects of fraud management, while the developing the skills and awareness of their staff was not given required focus, which may be one of the possible reasons for the existing deficiencies in fraud management. In fact, this study has found that human factor is a critical aspect of fraud management. It has also been established that customer education is not carried out effectively, despite the fact that identity theft mostly occurs at the customer side. A more active and explicit stance against identity fraud is recommended. However, because the e-tailers operate in a highly competitive environment, there is a trade-off between putting up extra security layers and the ease for customers for making a purchase, making identity fraud management ever more challenging for them. Present study contributes to the body of literature by understanding identity fraud management and analysing current managerial practices at large e-tailers. Reflecting on the theoretical and empirical data, e-tailers are forwarded some novel practices for better management of identity frauds. Additionally, e-tailers are also suggested improvements in existing managerial practices. This study may help e-tailers to effectively manage identity frauds, which will result in reduced fraud losses, better firm image and favourable customer relations and offering the society a secure environment for online shopping. Finally, a conceptual framework has been suggested for effective management of identity frauds in e-tail context. Managerial practices are suggested and guidelines are given at each stage of the framework for effective management of identity frauds

    Critical success factors in implementing an e-rostering system in a healthcare organisation

    Get PDF
    Effective and efficient staff scheduling has always been a challenging issue, especially in health service organisations. Both the extremes of staff shortage and overage have an adverse impact on the performance of healthcare organisations. In this case, an electronic and systematic staff scheduling (e-rostering) system is the often seen as the best solution. Unless an organisation has an effective implementation of such a system, possible cost savings, efficiency, and benefits could be minimal. This study is aimed to research key success factors for the successful effective implementation of an electronic rostering system, especially at healthcare organisations. A case study research method was used to evaluate critical success factors for effectively implementing an e-rostering system. The data were collected through interviews and observations. The findings indicate that technical support, an effective policy, leadership, clear goals and objectives, gradual change, evidence of the advantages of the new system, senior management support, and effective communication are the critical success factors in implementing an e-rostering system in healthcare organisations. Prior to this study, no such factors were grounded in the current context, so this research would help in bridging the gap towards effective implementation of an e-rostering system in the healthcare sector. This research also suggests future studies in different cultures and contexts

    Effects of a high-dose 24-h infusion of tranexamic acid on death and thromboembolic events in patients with acute gastrointestinal bleeding (HALT-IT): an international randomised, double-blind, placebo-controlled trial

    Get PDF
    Background: Tranexamic acid reduces surgical bleeding and reduces death due to bleeding in patients with trauma. Meta-analyses of small trials show that tranexamic acid might decrease deaths from gastrointestinal bleeding. We aimed to assess the effects of tranexamic acid in patients with gastrointestinal bleeding. Methods: We did an international, multicentre, randomised, placebo-controlled trial in 164 hospitals in 15 countries. Patients were enrolled if the responsible clinician was uncertain whether to use tranexamic acid, were aged above the minimum age considered an adult in their country (either aged 16 years and older or aged 18 years and older), and had significant (defined as at risk of bleeding to death) upper or lower gastrointestinal bleeding. Patients were randomly assigned by selection of a numbered treatment pack from a box containing eight packs that were identical apart from the pack number. Patients received either a loading dose of 1 g tranexamic acid, which was added to 100 mL infusion bag of 0·9% sodium chloride and infused by slow intravenous injection over 10 min, followed by a maintenance dose of 3 g tranexamic acid added to 1 L of any isotonic intravenous solution and infused at 125 mg/h for 24 h, or placebo (sodium chloride 0·9%). Patients, caregivers, and those assessing outcomes were masked to allocation. The primary outcome was death due to bleeding within 5 days of randomisation; analysis excluded patients who received neither dose of the allocated treatment and those for whom outcome data on death were unavailable. This trial was registered with Current Controlled Trials, ISRCTN11225767, and ClinicalTrials.gov, NCT01658124. Findings: Between July 4, 2013, and June 21, 2019, we randomly allocated 12 009 patients to receive tranexamic acid (5994, 49·9%) or matching placebo (6015, 50·1%), of whom 11 952 (99·5%) received the first dose of the allocated treatment. Death due to bleeding within 5 days of randomisation occurred in 222 (4%) of 5956 patients in the tranexamic acid group and in 226 (4%) of 5981 patients in the placebo group (risk ratio [RR] 0·99, 95% CI 0·82–1·18). Arterial thromboembolic events (myocardial infarction or stroke) were similar in the tranexamic acid group and placebo group (42 [0·7%] of 5952 vs 46 [0·8%] of 5977; 0·92; 0·60 to 1·39). Venous thromboembolic events (deep vein thrombosis or pulmonary embolism) were higher in tranexamic acid group than in the placebo group (48 [0·8%] of 5952 vs 26 [0·4%] of 5977; RR 1·85; 95% CI 1·15 to 2·98). Interpretation: We found that tranexamic acid did not reduce death from gastrointestinal bleeding. On the basis of our results, tranexamic acid should not be used for the treatment of gastrointestinal bleeding outside the context of a randomised trial

    A framework for ID fraud prevention policies in E-tailing sector

    No full text
    Identity fraud could lead to loss of revenue, causes operational problems to e-tailers and damages the firm’s reputation. Most research in this domain focuses on the security technologies or system users’ security compliance related issues.. In this research, we direct attention to understanding the content and breadth of identity fraud prevention policies. We conducted thirty-three semi-structured interviews with employees and management of three large UK based e-tailers. It was found that while e-tailers have policies and other related arrangements that address information security and data theft prevention, they often lack policies on identity fraud prevention. Additionally, we found that the design of security policy awareness strategies, approaches to updating security policies, and enforcement of security compliance/audits, do not help prevent identity fraud. Based on this analysis, we developed the Identity Fraud Prevention Policies Framework (IFPF) to help e-tailers develop and implement better identity fraud prevention practices

    Information Security Management Needs More Holistic Approach: A Literature Review

    No full text
    Information technology has dramatically increased online business opportunities; however these opportunities have also created serious risks in relation to information security. Previously, information security issues were studied in a technological context, but growing security needs have extended researchers' attention to explore the management role in information security management. Various studies have explored different management roles and activities, but none has given a comprehensive picture of these roles and activities to manage information security effectively. So it is necessary to accumulate knowledge about various managerial roles and activities from literature to enable managers to adopt these for a more holistic approach to information security management. In this paper, using a systematic literature review approach, we synthesised literature related to management's roles in information security to explore specific managerial activities to enhance information security management. We found that numerous activities of management, particularly development and execution of information security policy, awareness, compliance training, development of effective enterprise information architecture, IT infrastructure management, business and IT alignment and human resources management, had a significant impact on the quality of management of information security. Thus, this research makes a novel contribution by arguing that a more holistic approach to information security is needed and we suggest the ways in which managers can play an effective role in information security. This research also opens up many new avenues for further research in this area
    corecore