IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v25y2023i2d10.1007_s10796-022-10326-w.html
   My bibliography  Save this article

The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies

Author

Listed:
  • Romanus Izuchukwu Okeke

    (Cardiff Metropolitan University)

  • Max Hashem Eiza

    (Liverpool John Moores University)

Abstract

This paper aims to examine the challenges of preventing internal identity theft related crimes (IIDTRC) in the UK retail sector. Using an in-depth multiple case studies of a selected number of cross-functional management teams in the UK retail companies, management roles were analysed. We used semi-structured interview as a qualitative data collection technique and used Nvivo aided thematic analysis and interpretivism underpinned by Role-Based Framework (RBF) for analysis. Our findings revealed that vagueness of roles and lack of clarity in sharing data security responsibilities are the major challenges of preventing IIDTRC in UK retail companies. We suggest an application of RBF which provides a conceptual analysis for cross-functional management team to address the challenges of preventing IIDTRC. RBF enables clarity of shared roles where both information security and crimes prevention teams work in unison is required to prevent IIDTRC to maximise internal data security. Contributions for policymakers are offered in this paper.

Suggested Citation

  • Romanus Izuchukwu Okeke & Max Hashem Eiza, 2023. "The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies," Information Systems Frontiers, Springer, vol. 25(2), pages 451-472, April.
  • Handle: RePEc:spr:infosf:v:25:y:2023:i:2:d:10.1007_s10796-022-10326-w
    DOI: 10.1007/s10796-022-10326-w
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-022-10326-w
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-022-10326-w?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Shuyuan Mary Ho & Merrill Warkentin, 2017. "Leader’s dilemma game: An experimental design for cyber insider threat research," Information Systems Frontiers, Springer, vol. 19(2), pages 377-396, April.
    2. G. Hodgson, 2007. "What Are Institutions?," Voprosy Ekonomiki, NP Voprosy Ekonomiki, issue 8.
    3. Andrew M. Pettigrew, 1990. "Longitudinal Field Research on Change: Theory and Practice," Organization Science, INFORMS, vol. 1(3), pages 267-292, August.
    4. Yan Chen & Dennis F. Galletta & Paul Benjamin Lowry & Xin (Robert) Luo & Gregory D. Moody & Robert Willison, 2021. "Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model," Information Systems Research, INFORMS, vol. 32(3), pages 1043-1065, September.
    5. Jacob Haislip & Jee-Hae Lim & Robert Pinsker, 2021. "The Impact of Executives’ IT Expertise on Reported Data Security Breaches," Information Systems Research, INFORMS, vol. 32(2), pages 318-334, June.
    6. Gianfranco Walsh & Edward Shiu & Louise Hassan & Patrick Hille & Ikuo Takahashi, 2019. "Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development," Information Systems Frontiers, Springer, vol. 21(6), pages 1251-1264, December.
    7. Kutoma J. Wakunuma & Bernd Carsten Stahl, 2014. "Tomorrow’s ethics and today’s response: An investigation into the ways information systems professionals perceive and address emerging ethical issues," Information Systems Frontiers, Springer, vol. 16(3), pages 383-397, July.
    8. Carly L. Huth & David W. Chadwick & William R. Claycomb & Ilsun You, 2013. "Guest editorial: A brief overview of data leakage and insider threats," Information Systems Frontiers, Springer, vol. 15(1), pages 1-4, March.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Sagar Samtani & Ziming Zhao & Ram Krishnan, 2023. "Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence," Information Systems Frontiers, Springer, vol. 25(2), pages 425-429, April.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. A. F. Salam & Hua Dai & Lei Wang, 2022. "Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment," Information Systems Frontiers, Springer, vol. 24(6), pages 1929-1948, December.
    2. Davenport, Sally, 2005. "Exploring the role of proximity in SME knowledge-acquisition," Research Policy, Elsevier, vol. 34(5), pages 683-701, June.
    3. Fidrmuc, Jana P. & Jacob, Marcus, 2010. "Culture, agency costs, and dividends," Journal of Comparative Economics, Elsevier, vol. 38(3), pages 321-339, September.
    4. Obeidat, Zaid Mohammad & Xiao, Sarah Hong & Qasem, Zainah al & dweeri, Rami al & Obeidat, Ahmad, 2018. "Social media revenge: A typology of online consumer revenge," Journal of Retailing and Consumer Services, Elsevier, vol. 45(C), pages 239-255.
    5. Nastasi, Federico & Spagano, Salvatore, 2023. "Institutionalist Clues in Celso Furtado’s Economic Thought," MPRA Paper 120242, University Library of Munich, Germany.
    6. Maximiliano Marzetti & Rok Spruk, 2023. "Long-Term Economic Effects of Populist Legal Reforms: Evidence from Argentina," Comparative Economic Studies, Palgrave Macmillan;Association for Comparative Economic Studies, vol. 65(1), pages 60-95, March.
    7. Robert Roßner & Dimitrios Zikos, 2018. "The Role of Homogeneity and Heterogeneity Among Resource Users on Water Governance: Lessons Learnt from an Economic Field Experiment on Irrigation in Uzbekistan," Water Economics and Policy (WEP), World Scientific Publishing Co. Pte. Ltd., vol. 4(03), pages 1-30, July.
    8. Lehmann, Hans & Gallupe, Brent, 2005. "Information systems for multinational enterprises--some factors at work in their design and implementation," Journal of International Management, Elsevier, vol. 11(2), pages 163-186, June.
    9. Roe, R.A., 2005. "Studying time in organizational behavior," Research Memorandum 046, Maastricht University, Maastricht Research School of Economics of Technology and Organization (METEOR).
    10. Battaglia, Daniele & Landoni, Paolo & Rizzitelli, Francesco, 2017. "Organizational structures for external growth of University Technology Transfer Offices: An explorative analysis," Technological Forecasting and Social Change, Elsevier, vol. 123(C), pages 45-56.
    11. Maciejczak, Mariusz, 2015. "Will the institution of coexistence be re-defined by TTIP?," GMCC-15: Seventh GMCC, November 17-20, 2015, Amsterdam, the Netherlands 211478, International Conference on Coexistence between Genetically Modified (GM) and non-GM based Agricultural Supply Chains (GMCC).
    12. Xiang Li & Sun Sheng Han & Hao Wu, 2019. "Urban consolidation, power relations, and dilapidated residential redevelopment in Mutoulong, Shenzhen, China," Urban Studies, Urban Studies Journal Limited, vol. 56(13), pages 2802-2819, October.
    13. Mika Kallioinen, 2017. "Inter‐communal institutions in medieval trade," Economic History Review, Economic History Society, vol. 70(4), pages 1131-1152, November.
    14. Luis Alfonso Dau & Aya S. Chacar & Marjorie A. Lyles & Jiatao Li, 2022. "Informal institutions and international business: Toward an integrative research agenda," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 53(6), pages 985-1010, August.
    15. Fox, Stephen & Groesser, Stefan N., 2016. "Reframing the relevance of research to practice," European Management Journal, Elsevier, vol. 34(5), pages 457-465.
    16. Sternitzke, Christian, 2013. "An exploratory analysis of patent fencing in pharmaceuticals: The case of PDE5 inhibitors," Research Policy, Elsevier, vol. 42(2), pages 542-551.
    17. Pettus, Michael L. & Kor, Yasemin Y. & Mahoney, Joseph T., 2007. "A Theory of Change in Turbulent Environments: The Sequencing of Dynamic Capabilities Following Industry Deregulation," Working Papers 07-0100, University of Illinois at Urbana-Champaign, College of Business.
    18. Swan, Jacky & Goussevskaia, Anna & Newell, Sue & Robertson, Maxine & Bresnen, Mike & Obembe, Ademola, 2007. "Modes of organizing biomedical innovation in the UK and US and the role of integrative and relational capabilities," Research Policy, Elsevier, vol. 36(4), pages 529-547, May.
    19. Sally Maitlis & Thomas B. Lawrence, 2003. "Orchestral Manoeuvres in the Dark: Understanding Failure in Organizational Strategizing," Journal of Management Studies, Wiley Blackwell, vol. 40(1), pages 109-139, January.
    20. Gebauer, Heiko & Worch, Hagen & Truffer, Bernhard, 2012. "Absorptive capacity, learning processes and combinative capabilities as determinants of strategic innovation," European Management Journal, Elsevier, vol. 30(1), pages 57-73.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:25:y:2023:i:2:d:10.1007_s10796-022-10326-w. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.