Search results

1 – 10 of 285
Article
Publication date: 20 March 2020

David Lacey, Sigi Goode, Jerry Pawada and Dennis Gibson

The purpose of this paper is to undertake an exploratory study on mapping the investment fraud methods and tactics used by scammers against the emerging literature on scam…

Abstract

Purpose

The purpose of this paper is to undertake an exploratory study on mapping the investment fraud methods and tactics used by scammers against the emerging literature on scam compliance.

Design/methodology/approach

Qualitative interviews were conducted with victims of investment fraud supported by the engagement of specialist counsellors and allied health professionals who specialise in scam victim support (including investment fraud).

Findings

Investment fraud offending in the cases sampled exhibited a number of dominant offending traits and methodological themes. These included a strong reliance or dependency on legitimate service provisioning on the part of the fraudster and the use of key trust measures to lure the victim. The empirical data revealed the presence of a number of scam compliance influences captured in the literature, including trust, social influence and urgency, as well as others not previously documented that pave the way for further research attention.

Research limitations/implications

The research only examined a sample of investment fraud victim experiences that engaged a national victim support service immediately following detection over a 24 month period.

Practical implications

The research found that offending relied upon the participation of trust-building signals and measures. Legitimate economy participants appear to play a dominant role in enabling investment scam activities, further creating efficiencies for criminals. The offending tended to follow a number of distinct but connected phases. Impacts were influenced by specific offending attributes, such as whether remote access was given to offenders of a victim’s device, as well as the nature of the identity credentials access.

Originality/value

The research has practically applied an emerging view of scam compliance influences and vulnerabilities within an investment fraud context. The study is novel in its thematic analysis of the distinct phases and tactics used by scammers.

Details

Journal of Criminological Research, Policy and Practice, vol. 6 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 25 August 2021

Sigi Goode and David Lacey

This paper aims to assert that knowledge of organisational weaknesses, vulnerabilities and compromise points (here termed “dark knowledge”), is just as critical to organisational…

Abstract

Purpose

This paper aims to assert that knowledge of organisational weaknesses, vulnerabilities and compromise points (here termed “dark knowledge”), is just as critical to organisational integrity and hence, must also be managed in a conventional knowledge management sense. However, such dark knowledge is typically difficult to identify and accordingly, few studies have attempted to conceptualise this view.

Design/methodology/approach

Using a background of fraud diamond theory, the authors examine this dark knowledge using a case study analysis of fraud at a large Asia-Pacific telecommunications provider. Semi-structured interviews were also conducted with the firm’s fraud unit.

Findings

The authors identify six components of dark knowledge, being artefactual knowledge, consequential knowledge, knowledge of opportunity, knowledge of experimentality, knowledge of identity and action and knowledge of alternativity.

Originality/value

To the best of the authors’ knowledge, this is the first paper to identify a knowledge type based on organisational compromises and vulnerabilities. The paper shows that accounts of organisational weakness can yet provide knowledge insights.

Details

Journal of Knowledge Management, vol. 26 no. 6
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 16 March 2012

Geordie Stewart and David Lacey

The purpose of this paper is to examine why mainstream information security awareness techniques have failed to evolve at the same rate as automated technical security controls…

1925

Abstract

Purpose

The purpose of this paper is to examine why mainstream information security awareness techniques have failed to evolve at the same rate as automated technical security controls and to suggest improvements based on psychology and safety science.

Design/methodology/approach

The concepts of bounded rationality, mental models and the extended parallel processing model are examined in an information security context.

Findings

There is a lack of formal methodologies in information security awareness for systematically identifying audience communication requirements. Problems with human behaviour in an information security context are assumed to be caused by a lack of facts available to the audience. Awareness, therefore, is largely treated as the broadcast of facts to an audience in the hope that behaviour improves. There is a tendency for technical experts in the field of information security to tell people what they think they ought to know (and may in fact already know). This “technocratic” view of risk communication is fundamentally flawed and has been strongly criticised by experts in safety risk communications as ineffective and inefficient.

Practical implications

The paper shows how the approach to information security awareness can be improved using knowledge from the safety field.

Originality/value

The paper demonstrates how advanced concepts from safety science can be used to improve information security risk communications.

Article
Publication date: 23 March 2010

David Lacey

The purpose of this paper is to examine the practical issues, techniques and learning points associated with information security awareness and organizational change programmes.

3947

Abstract

Purpose

The purpose of this paper is to examine the practical issues, techniques and learning points associated with information security awareness and organizational change programmes.

Design/methodology/approach

The paper is based on the findings and conclusions of research, observations and projects carried out in large organizations over the last two decades. It highlights failings and critical success factors in contemporary approaches to transform organizational culture. It draws on theory and research from the industrial safety field, and discusses its relevance in the information security field.

Findings

The paper identifies the primary reasons why many contemporary enterprise security awareness programmes are ineffective. It discusses the nature of the problem and solution space, identifying the practical issues and opportunities, and gives recommendations on how future programmes can be improved.

Research limitations/implications

The paper identifies gaps in current research, including the need to confirm whether or not certain findings about incidents in safety field might be applicable to security incidents. It calls for a new approach to information security management that incorporates theory and techniques drawn from psychology and marketing.

Practical implications

The paper is intended to educate students and researchers working in the information security field on issues and techniques associated with information security awareness and organizational change programmes. It also provides practical advice for business organizations on how to design and implement such programmes.

Originality/value

The paper takes a fresh approach to the subject, examining the relevance of theory and techniques adapted from other fields and drawing new conclusions about the requirements and approach for effective information security awareness and organizational change programmes.

Details

Information Management & Computer Security, vol. 18 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 2 July 2019

Dennis B. Desmond, David Lacey and Paul Salmon

The purpose of this paper is to present the findings from a literature review, which aimed to identify previous studies evaluating cryptolaundering from a systems thinking…

1527

Abstract

Purpose

The purpose of this paper is to present the findings from a literature review, which aimed to identify previous studies evaluating cryptolaundering from a systems thinking perspective. The aim of this paper is to first confirm that cryptolaundering systems can indeed be defined as complex socio-technical systems and second to present the findings from a systematic review of the literature to determine the extent to which previous research has adopted a systems thinking perspective.

Design/methodology/approach

The study involved a SLR of studies published in the peer-reviewed literature between 2009 and 2018. Rasmussen’s risk management framework (Rasmussen, 1997) was used to evaluate the extent to which a systems thinking perspective had been adopted.

Findings

The cryptolaundering process is considered to be a complex socio-technical system. The review demonstrates that no previous studies have defined cryptolaundering as a complex socio-technical system or used systems thinking framework approach to evaluate how criminals, regulatory bodies or law enforcement entities understand processes and assess risk within cryptolaundering systems. It is argued that using such an approach to the cryptolaundering process would likely improve assessing criminal risk analyses of cryptolaundering and assist law enforcement and regulatory bodies with understanding risk management during the laundering of cryptocurrencies.

Originality/value

Future assessments of cryptolaundering using socio-technical system analytical processes may afford law enforcement and regulatory bodies the opportunity to improve intervention techniques and identify gaps in regulations and enforcement.

Details

Journal of Money Laundering Control, vol. 22 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 March 1990

Sue Lacey Bryant, David F. Cheshire, Allan Bunch and Edwin Fleming

“‘Personable’ is management‐ese for ‘crumpet’”. Thus observed an old friend late last Sunday; much too late indeed for the subsequent dialogue about equal opportunities, in which…

Abstract

“‘Personable’ is management‐ese for ‘crumpet’”. Thus observed an old friend late last Sunday; much too late indeed for the subsequent dialogue about equal opportunities, in which we drew heavily upon anecdotal evidence, experiential learning and totally unsubstantiated surmise. What better cocktail for an evening's imbibing, and where better than the pages of NLW to air one of the hidden agendas of professional life?

Details

New Library World, vol. 91 no. 3
Type: Research Article
ISSN: 0307-4803

Article
Publication date: 5 October 2015

Paul Bonny, Sigi Goode and David Lacey

This paper aims to present the findings of a study examining fraud in the workplace setting, principally in the Australasian context. Although prior research into occupational…

2677

Abstract

Purpose

This paper aims to present the findings of a study examining fraud in the workplace setting, principally in the Australasian context. Although prior research into occupational fraud is conceptually rich, there is a lack of empirical evidence of this important but elusive problem.

Design/methodology/approach

Based on investigative data from 14 participating firms, the paper provides insights into the gender breakdowns and stated motivations of offenders. The paper also provides evidence of the number of investigations, interviews and reports to law enforcement in these firms.

Findings

The study finds that genders are evenly balanced for most firms, with females significantly outnumbering males in banking firms. Self-imposed financial hardship was the most popular motivator. Of the number of admissions to wrongdoing, only half were subsequently reported to law enforcement.

Research limitations/implications

Particularly complex or advanced types of occupational fraud may go unreported or undetected: as a result, the figures presented in this study may be incomplete. Reported figures are based largely on historical data provided by respondents, and the authors are unable to report accurate details of the respondent firms. This makes it difficult to determine the frequency of offending against the background population.

Practical implications

Investigators should continue to look for changes in the life circumstances of their staff. Such changes will give an indication of instances of staff living beyond their means and the sudden financial pressures that can compel occupational fraud. Instead of trying to supervise staff to an impractical degree, managers and proprietors would be well advised to be alert to the kind of pressures that their staff might experience.

Social implications

Social control and detection measures are likely to be easier to implement and less invasive than technical controls. The study provides additional pressure to update traditional conceptualisations of the male white collar offender. While male offenders were responsible for larger losses per case, females were more numerous in the summary offence data.

Originality/value

Gaining insights into the problem of employee fraud and white collar crime is difficult. The authors’ contribution in this paper is to provide empirical insights into the makeup of white collar offenders, including insights on gender.

Details

Journal of Financial Crime, vol. 22 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 4 January 2016

Hui Yuen Peng, Mutharasu Devarajan, Teik Toon Lee and David Lacey

The purpose of this paper is to investigate the reliability of wire bonds with three varying ball bond diameters, which are ball bonded with three different sizes of gold wires in…

Abstract

Purpose

The purpose of this paper is to investigate the reliability of wire bonds with three varying ball bond diameters, which are ball bonded with three different sizes of gold wires in light-emitting diode (LED) package under high-temperature environment. In automotive applications, “lifted ball bond” issue is a potential critical point for LED device reliability, as the wire bonds are usually stressed under high operating temperature during their lifetime. Moreover, the reliability of wire bonds in recent LED production has fallen under scrutiny due to the practice of reducing wire diameters to cut down production costs.

Design/methodology/approach

Three gold wires with sizes of 2, 1.5 and 1 mm were ball bonded on the LED chip bond pad via thermosonic wire bonding method to produce three different ball bond diameters, that is, 140, 120 and 100 μm, respectively. The reliability of these wire bond samples was then studied by performing isothermal aging at 200°C for the time interval of 30, 100 and 500 hours. To validate hypotheses based on the experimental data, COMSOL Multiphysics simulation was also applied to study the thermal stress distribution of wire bond under an elevated temperature.

Findings

Experimental results show that the interfacial adhesion of wire bond degrades significantly after aging at 200°C for 500 hours, and the rate of interfacial degradation was found to be more rapid in the wire bond with smaller ball bond diameter. Experimental results also show that ball bonds randomly elongate along an axis and deforms into elliptical shapes after isothermal aging, and ball bonds with smaller diameters develop more obvious elongations. This observation has not been reported in any previous studies. Simulation results show that higher thermal stress is induced in the wire bond with the decrease of ball bond diameter.

Practical implications

The reliability study of this paper provides measurements and explanation on the effects of wire diameter downsizing in wire bonds for automotive application. This is applicable as a reliability reference for industries who intend to reduce their production costs. Other than that, the analysis method of thermal stresses using COMSOL Multiphysics simulations can be extended by other COMSOL Multiphysics users in the future.

Originality/value

To resolve “lifted ball bond” issue, optimization of the bond pad surface quality and the wire bond parameter has been studied and reported in many studies, but the influence of ball bond diameter on wire bond reliability is rarely focused. Moreover, the observation of ball bonds randomly elongate and deform more into elliptical shape, and ball bond with smaller diameter has the highest elongation after isothermal aging also still has not been reported in any previous studies.

Article
Publication date: 1 July 1989

David Gerard, Sue Lacey Bryant, Mike Cornford and Sandra Vogel

I went to the Booksellers' Conference Exhibition (persona ELM Publications, Educational Books and Resources) hoping to alert booksellers to our new Factpacks series [Jackdaw…

Abstract

I went to the Booksellers' Conference Exhibition (persona ELM Publications, Educational Books and Resources) hoping to alert booksellers to our new Factpacks series [Jackdaw look‐alikes, but with interesting differences].

Details

New Library World, vol. 90 no. 7
Type: Research Article
ISSN: 0307-4803

Abstract

Details

Records Management Journal, vol. 21 no. 1
Type: Research Article
ISSN: 0956-5698

Keywords

1 – 10 of 285