Search results
1 – 5 of 5Donald C. Heiman and Larry E. Pate
A research study suggested that factors related to different learning styles played a — somewhat complex — part in explaining management level promotions and relative salaries in…
Abstract
A research study suggested that factors related to different learning styles played a — somewhat complex — part in explaining management level promotions and relative salaries in an audit agency. The implications of the findings are explored in terms of a management promotions and rewards strategy in audit type organisations which accommodates the need for differences of perspective in decision making with similarities of perspective in implementation.
Details
Keywords
Larry B. Pate and Donald C. Heiman
It should be re‐emphasized, however, that the [Vroom‐Yetton] model is explicitly normative in character in that it specifies what leaders should do in various organizational…
Abstract
It should be re‐emphasized, however, that the [Vroom‐Yetton] model is explicitly normative in character in that it specifies what leaders should do in various organizational circumstances — rather than attempting to summarize what leaders do do and what the effects of those actions are. Thus, if the assumptions in the model about the outcomes which result from various leader behaviors are incorrect, the model will lead to faulty behavioral prescriptions.
The evolution of electronic information technologies in a Midwest state in the USA are discussed and this evolution is compared to national trends for processing information…
Abstract
The evolution of electronic information technologies in a Midwest state in the USA are discussed and this evolution is compared to national trends for processing information. Information management technologies are now in the third stage of evolution. Over the next five years, the technology for handling information will fully integrate voice, data, and video technologies. This integration has profound implications for how organizations manage its enactment and how organizations will adapt to their internal and external environments. In order to manage these enactments and adaptations, a new way of planning is required. Traditional “bottom up” and “top down” planning methodologies must be integrated into a planning method that defines the knit between information system architectures and resources with corporate policies and business plans. The article presents a model of this integrated planning approach for practitioners and policy makers who are responsible for designing organizational systems.
Details
Keywords
Neha Chhabra Roy and Sreeleakha Prabhakaran
The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian…
Abstract
Purpose
The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian banks. The authors attempted to identify and classify cyber frauds and its drivers and correlate them for optimal mitigation planning.
Design/methodology/approach
The methodology opted for the identification and classification is through a detailed literature review and focus group discussion with risk and vigilance officers and cyber cell experts. The authors assessed the future of cyber fraud in the Indian banking business through the machine learning–based k-nearest neighbor (K-NN) approach and prioritized and predicted the future of cyber fraud. The predicted future revealing dominance of a few specific cyber frauds will help to get an appropriate fraud prevention model, using an associated parties centric (victim and offender) root-cause approach. The study uses correlation analysis and maps frauds with their respective drivers to determine the resource specific effective mitigation plan.
Findings
Finally, the paper concludes with a conceptual framework for preventing internal-led cyber fraud within the scope of the study. A cyber fraud mitigation ecosystem will be helpful for policymakers and fraud investigation officers to create a more robust environment for banks through timely and quick detection of cyber frauds and prevention of them.
Research limitations/implications
Additionally, the study supports the Reserve Bank of India and the Government of India's launched cyber security initiates and schemes which ensure protection for the banking ecosystem i.e. RBI direct scheme, integrated ombudsman scheme, cyber swachhta kendra (botnet cleaning and malware analysis centre), National Cyber Coordination Centre (NCCC) and Security Monitoring Centre (SMC).
Practical implications
Structured and effective internal-led plans for cyber fraud mitigation proposed in this study will conserve banks, employees, regulatory authorities, customers and economic resources, save bank authorities’ and policymakers’ time and money, and conserve resources. Additionally, this will enhance the reputation of the Indian banking industry and extend its lifespan.
Originality/value
The innovative insider-led cyber fraud mitigation approach quickly identifies cyber fraud, prioritizes it, identifies its prominent root causes, map frauds with respective root causes and then suggests strategies to ensure a cost-effective and time-saving bank ecosystem.
Details
Keywords
Neha Chhabra Roy and Sreeleakha Prabhakaran
This paper aims to focus on the different types of insider-led cyber frauds that gained mainstream attention in recent large-scale fraud events involving prominent Indian banking…
Abstract
Purpose
This paper aims to focus on the different types of insider-led cyber frauds that gained mainstream attention in recent large-scale fraud events involving prominent Indian banking institutions. In addition to identifying and classifying cyber fraud, the study maps them on a severity scale for optimal mitigation planning.
Design/methodology/approach
The methodology used for identification and classification is an analysis of a detailed literature review, a focus group discussion with risk and vigilance officers and cyber cell experts, as well as secondary data of cyber fraud losses. Through machine learning-based random forest, the authors predicted the future of insider-led cyber frauds in the Indian banking business and prioritized and predicted the same. The projected future reveals the dominance of a few specific cyber frauds, which will make it easier to develop a fraud mitigation model based on a victim-centric approach.
Findings
The paper concludes with a conceptual framework that can be used to ensure a sustainable cyber fraud mitigation ecosystem within the scope of the study. By using the findings of this research, policymakers and fraud investigators will be able to create a more robust environment for banks through timely detection of cyber fraud and prevent it appropriately before it happens.
Research limitations/implications
The study focuses on fraud, risk and mitigation from a victim-centric perspective and does not address it from the fraudster’s perspective. Data availability was a challenge. Banks are recommended to compile data that can be used for analysis both by themselves and other policymakers.
Practical implications
The structured, sustainable cyber fraud mitigation suggested in the study will provide an agile, quick, proactive, stakeholder-specific plan that helps to safeguard banks, employees, regulatory authorities, customers and the economy. It saves resources, cost and time for bank authorities and policymakers. The mitigation measures will also help improve the reputational status of the Indian banking business and prolong the banks’ sustenance.
Originality/value
The innovative cyber fraud mitigation approach contributes to the sustainability of a bank’s ecosystem quickly, proactively and effectively.
Details