Search results

1 – 7 of 7
Article
Publication date: 1 February 1987

Donald C. Heiman and Larry E. Pate

A research study suggested that factors related to different learning styles played a — somewhat complex — part in explaining management level promotions and relative salaries in…

Abstract

A research study suggested that factors related to different learning styles played a — somewhat complex — part in explaining management level promotions and relative salaries in an audit agency. The implications of the findings are explored in terms of a management promotions and rewards strategy in audit type organisations which accommodates the need for differences of perspective in decision making with similarities of perspective in implementation.

Details

Managerial Auditing Journal, vol. 2 no. 2
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 1 February 1987

Larry B. Pate and Donald C. Heiman

It should be re‐emphasized, however, that the [Vroom‐Yetton] model is explicitly normative in character in that it specifies what leaders should do in various organizational…

Abstract

It should be re‐emphasized, however, that the [Vroom‐Yetton] model is explicitly normative in character in that it specifies what leaders should do in various organizational circumstances — rather than attempting to summarize what leaders do do and what the effects of those actions are. Thus, if the assumptions in the model about the outcomes which result from various leader behaviors are incorrect, the model will lead to faulty behavioral prescriptions.

Details

Personnel Review, vol. 16 no. 2
Type: Research Article
ISSN: 0048-3486

Article
Publication date: 1 February 1988

Donald C. Heiman

The evolution of electronic information technologies in a Midwest state in the USA are discussed and this evolution is compared to national trends for processing information…

Abstract

The evolution of electronic information technologies in a Midwest state in the USA are discussed and this evolution is compared to national trends for processing information. Information management technologies are now in the third stage of evolution. Over the next five years, the technology for handling information will fully integrate voice, data, and video technologies. This integration has profound implications for how organizations manage its enactment and how organizations will adapt to their internal and external environments. In order to manage these enactments and adaptations, a new way of planning is required. Traditional “bottom up” and “top down” planning methodologies must be integrated into a planning method that defines the knit between information system architectures and resources with corporate policies and business plans. The article presents a model of this integrated planning approach for practitioners and policy makers who are responsible for designing organizational systems.

Details

Journal of Organizational Change Management, vol. 1 no. 2
Type: Research Article
ISSN: 0953-4814

Keywords

Book part
Publication date: 13 August 2018

Robert L. Dipboye

Abstract

Details

The Emerald Review of Industrial and Organizational Psychology
Type: Book
ISBN: 978-1-78743-786-9

Article
Publication date: 12 August 2022

Neha Chhabra Roy and Sreeleakha Prabhakaran

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian…

1444

Abstract

Purpose

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian banks. The authors attempted to identify and classify cyber frauds and its drivers and correlate them for optimal mitigation planning.

Design/methodology/approach

The methodology opted for the identification and classification is through a detailed literature review and focus group discussion with risk and vigilance officers and cyber cell experts. The authors assessed the future of cyber fraud in the Indian banking business through the machine learning–based k-nearest neighbor (K-NN) approach and prioritized and predicted the future of cyber fraud. The predicted future revealing dominance of a few specific cyber frauds will help to get an appropriate fraud prevention model, using an associated parties centric (victim and offender) root-cause approach. The study uses correlation analysis and maps frauds with their respective drivers to determine the resource specific effective mitigation plan.

Findings

Finally, the paper concludes with a conceptual framework for preventing internal-led cyber fraud within the scope of the study. A cyber fraud mitigation ecosystem will be helpful for policymakers and fraud investigation officers to create a more robust environment for banks through timely and quick detection of cyber frauds and prevention of them.

Research limitations/implications

Additionally, the study supports the Reserve Bank of India and the Government of India's launched cyber security initiates and schemes which ensure protection for the banking ecosystem i.e. RBI direct scheme, integrated ombudsman scheme, cyber swachhta kendra (botnet cleaning and malware analysis centre), National Cyber Coordination Centre (NCCC) and Security Monitoring Centre (SMC).

Practical implications

Structured and effective internal-led plans for cyber fraud mitigation proposed in this study will conserve banks, employees, regulatory authorities, customers and economic resources, save bank authorities’ and policymakers’ time and money, and conserve resources. Additionally, this will enhance the reputation of the Indian banking industry and extend its lifespan.

Originality/value

The innovative insider-led cyber fraud mitigation approach quickly identifies cyber fraud, prioritizes it, identifies its prominent root causes, map frauds with respective root causes and then suggests strategies to ensure a cost-effective and time-saving bank ecosystem.

Details

Aslib Journal of Information Management, vol. 75 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 8 February 2022

Neha Chhabra Roy and Sreeleakha Prabhakaran

This paper aims to focus on the different types of insider-led cyber frauds that gained mainstream attention in recent large-scale fraud events involving prominent Indian banking…

1184

Abstract

Purpose

This paper aims to focus on the different types of insider-led cyber frauds that gained mainstream attention in recent large-scale fraud events involving prominent Indian banking institutions. In addition to identifying and classifying cyber fraud, the study maps them on a severity scale for optimal mitigation planning.

Design/methodology/approach

The methodology used for identification and classification is an analysis of a detailed literature review, a focus group discussion with risk and vigilance officers and cyber cell experts, as well as secondary data of cyber fraud losses. Through machine learning-based random forest, the authors predicted the future of insider-led cyber frauds in the Indian banking business and prioritized and predicted the same. The projected future reveals the dominance of a few specific cyber frauds, which will make it easier to develop a fraud mitigation model based on a victim-centric approach.

Findings

The paper concludes with a conceptual framework that can be used to ensure a sustainable cyber fraud mitigation ecosystem within the scope of the study. By using the findings of this research, policymakers and fraud investigators will be able to create a more robust environment for banks through timely detection of cyber fraud and prevent it appropriately before it happens.

Research limitations/implications

The study focuses on fraud, risk and mitigation from a victim-centric perspective and does not address it from the fraudster’s perspective. Data availability was a challenge. Banks are recommended to compile data that can be used for analysis both by themselves and other policymakers.

Practical implications

The structured, sustainable cyber fraud mitigation suggested in the study will provide an agile, quick, proactive, stakeholder-specific plan that helps to safeguard banks, employees, regulatory authorities, customers and the economy. It saves resources, cost and time for bank authorities and policymakers. The mitigation measures will also help improve the reputational status of the Indian banking business and prolong the banks’ sustenance.

Originality/value

The innovative cyber fraud mitigation approach contributes to the sustainability of a bank’s ecosystem quickly, proactively and effectively.

1 – 7 of 7