Networks of Cybercrime Prevention: A Process Study of the Credit Card
2015 | European Conference On Information Systems | Citations: 0
Authors: Dahabiyeh, Laila
Abstract: This research-in-progress paper reports on a project that seeks to develop a new ...
Expand
Abstract: This research-in-progress paper reports on a project that seeks to develop a new process perspective on incentive mechanisms in cybercrime prevention networks. Adopting such a view is of great importance given the continuous innovations in cybercrime that makes fighting it a constant endeavour, involving actors from multiple networks. To this end, we zoom in on specific prevention encounters occurring throughout the process of producing prevention measures, to identify incentive mechanisms needed to bring heterogeneous actors together in cybercrime prevention networks. Our longitudinal case study of credit card fraud and how it has developed over time resulted in identifying eleven prevention encounters that are critical in the fraud prevention lifecycle. Upon completion of this research, we anticipate to contribute to current literature on security networks in three ways. First, offer a new understanding on incentive mechanisms that accounts for the role of contextual conditions in shaping these incentives. Second, add diversity to research methods used to study incentives by adopting a qualitative case study approach. Third, we shed more light on the role of technology in building incentive mechanisms in cybercrime prevention networks.
Collapse
Semantic filters:
credit card industry
Topics:
computer crime credit card fraud IT security innovation management database system
Methods:
case study archival research longitudinal research longitudinal case study mathematical model
2008 | Journal of Strategic Information Systems | Citations: 0
Authors: Galliers, Bob; Jarvenpaa, Sirkka
Abstract: Editorial JSIS editorial Fall 2008 issueThis issue of Journal of Strategic Info ...
Expand
Abstract: Editorial JSIS editorial Fall 2008 issueThis issue of Journal of Strategic Information systems (JSIS) is comprised of five articles: four regular research articles and one special issue article from the Global Mobility Roundtable. Respectively, the papers are written by researchers from the USA, the Netherlands, Japan, China, and Lithuania. The regular articles focus on a number of different strategic levers including information-based strategy, stakeholder analysis, human resources development, and privacy. In all of these articles, information and communication technologies (ICT) take on different roles in the processes. The last article explores how the better understanding of ICT non-use can help us design more useful technologies.Our first paper is by Eric Clemons of University of Pennsylvania, USA and Matt Thatcher of University of Louisville, USA. The article reports on a case study of Capital One and how this young company used an information-based strategy, strong executive champions, integrated culture, and information technology to penetrate a mature credit card industry and create the conditions of newly vulnerable markets. The case study provides an initial, partial validation of the theory of newly vulnerable markets and advances propositions for further study. The case provides a powerful example of the transformational impact that information technologies can have on industries and firms where market share and brand recognition have traditionally provided advantage.Our next article in this issue is on interorganizational information systems (IOS) by Albert Boonstra and Jan de Vries of University of Groningen, The Netherlands. The authors build on the existing work on IOS and explore the role of power and interests of different stakeholders in the implementation of IOS. Based on a case study that encompassed more than seven years, the article advances a theoretically grounded diagnostic framework to evaluate the power and interest relationships of various stakeholders. These interests and power relationships are highly dynamic and dependent on the organizational setting of the IOS, an informational infrastructure, and technical elements, among others. The paper underpins the necessity to reassess the position of the stakeholders involved in an IOS project on a frequent basis and take a multiple perspective assessment approach to IOS implementation. The paper has much food for thought for both information systems researchers and practitioners.Our third article in this issue is by Makoto Matsuo of Otaru University of Commerce, Japan, and Christina Wong and Kee-hung Lai, both from the Hong Kong Polytechnic University, China. In an empirical study involving professionals in leading Japanese information technology firms, they examine experience-based learning processes of IT project managers and consultants at different career stages within the theoretical framework of experiential learning. The researchers find that the different job types are associated with different experience-based learning processes and these processes vary by the career stage. Interestingly, communities of practice and mentoring relationships appear to be important for the development of skills of IT project managers, but not for consultants who develop their abilities more through single-handed experiences. IT project managers displayed group management skills, whereas consultants demonstrated analytical skills. Customer management skills were demonstrated by both IT project managers and consultants. The acquired skills varied by the experience level (career stage). The key contribution of the article is to highlight that on-the-job learning processes vary by job type and career stage.The final regular article is by Tamara Dinev, Paul Hart, and Michael Mullen, all from Florida Atlantic University, USA. The authors take up the Internet privacy theme and the willingness to disclose personal information by considering beliefs about government surveillance. This US based empirical study focuses on shedding new insight to privacy issues by extending the privacy calculus model. The privacy calculus model addresses the willingness to disclose personal information required to complete online transactions. The model is extended to consider the perceived need for governmental surveillance and concerns over governmental intrusion. With the sample of 400 respondents, the authors find that the perceived need for government surveillance was negatively related to privacy concerns and positively related to willingness to disclose personal information. On the other hand, concerns about government intrusion were positively related to privacy concerns, but did not affect willingness to disclose personal information. The authors provide alternative interpretations of findings. 0963-8687/$ -see front matter Published by Elsevier Ltd.
Collapse
Semantic filters:
credit card industry
Topics:
privacy information privacy concern consumer behavior interorganizational system IT career
Methods:
case study
Theories:
privacy calculus theory
Justifying Contingent Information Technology Investments: Balancing the Need for Speed of Action with Certainty Before Action
2003 | Journal of Management Information Systems | Citations: 18
Authors: Clemons, Eric K.; Bin Gu
Abstract: Executives need to master different mechanisms for analyzing their firms' invest ...
Expand
Abstract: Executives need to master different mechanisms for analyzing their firms' investment opportunities in uncertain, difficult times. Rapidly changing business conditions require firms to move quickly, with total commitment and the rapid deployment of capital, resources, and management attention, often in several directions at the same time. However, high levels of strategic uncertainty and environmental risk, combined with limits on available funding, require firms to limit their commitment. In brief, we require high levels of strategic commitment to numerous projects, while simultaneously preserving our flexibility and withholding commitment. Whereas achieving both is clearly impossible, techniques exist that enable executives (1) to identify and to delimit their range of investment alternatives that must be considered, and to do so rapidly and reliably, (2) to divide investments into discrete stages that can be implemented sequentially, (3) to determine which chunks can safely and profitably be developed as strategic options, with value that can be captured when subsequent stage investments are made later; and (4) to quantify and to estimate the value of these strategic options with a significant degree of accuracy, so that selections can be made from a portfolio of investment alternatives. This paper also avoids restrictions of common option valuation models by providing a technique that is general enough to be used when the data required by common models are not available or the assumptions are not satisfied.
Collapse
Semantic filters:
credit card industry
Topics:
price management IT investment real option information technology infrastructure IT manager
Methods:
machine learning experiment economic model simulation
Theories:
options theory real options theory
Justification of Data Warehousing for DSS: A Competitive Advantage Point of View
1998 | Americas Conference on Information Systems | Citations: 1
Authors: Park, Yong-Tae
Abstract: This study analyzes twenty-three successful data warehouse implementations along ...
Expand
Abstract: This study analyzes twenty-three successful data warehouse implementations along Porter’s (1985) value chain model. It identifies the commonalities among the implementations in terms of project justification by applying the competitive advantage concept. A conceptual model, “Justification Grid of Data Warehousing,” provides a framework for organizations considering data warehousing that allows them to assess and evaluate data warehousing projects strategically. The framework is a complementary approach to cost-benefit analysis (CBA) in a comprehensive, organization-wide project justification.
Collapse