IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v25y2023i2d10.1007_s10796-022-10326-w.html
   My bibliography  Save this article

The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies

Author

Listed:
  • Romanus Izuchukwu Okeke

    (Cardiff Metropolitan University)

  • Max Hashem Eiza

    (Liverpool John Moores University)

Abstract

This paper aims to examine the challenges of preventing internal identity theft related crimes (IIDTRC) in the UK retail sector. Using an in-depth multiple case studies of a selected number of cross-functional management teams in the UK retail companies, management roles were analysed. We used semi-structured interview as a qualitative data collection technique and used Nvivo aided thematic analysis and interpretivism underpinned by Role-Based Framework (RBF) for analysis. Our findings revealed that vagueness of roles and lack of clarity in sharing data security responsibilities are the major challenges of preventing IIDTRC in UK retail companies. We suggest an application of RBF which provides a conceptual analysis for cross-functional management team to address the challenges of preventing IIDTRC. RBF enables clarity of shared roles where both information security and crimes prevention teams work in unison is required to prevent IIDTRC to maximise internal data security. Contributions for policymakers are offered in this paper.

Suggested Citation

  • Romanus Izuchukwu Okeke & Max Hashem Eiza, 2023. "The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies," Information Systems Frontiers, Springer, vol. 25(2), pages 451-472, April.
  • Handle: RePEc:spr:infosf:v:25:y:2023:i:2:d:10.1007_s10796-022-10326-w
    DOI: 10.1007/s10796-022-10326-w
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-022-10326-w
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-022-10326-w?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. G. Hodgson, 2007. "What Are Institutions?," Voprosy Ekonomiki, NP Voprosy Ekonomiki, issue 8.
    2. Kutoma J. Wakunuma & Bernd Carsten Stahl, 2014. "Tomorrow’s ethics and today’s response: An investigation into the ways information systems professionals perceive and address emerging ethical issues," Information Systems Frontiers, Springer, vol. 16(3), pages 383-397, July.
    3. Carly L. Huth & David W. Chadwick & William R. Claycomb & Ilsun You, 2013. "Guest editorial: A brief overview of data leakage and insider threats," Information Systems Frontiers, Springer, vol. 15(1), pages 1-4, March.
    4. Shuyuan Mary Ho & Merrill Warkentin, 2017. "Leader’s dilemma game: An experimental design for cyber insider threat research," Information Systems Frontiers, Springer, vol. 19(2), pages 377-396, April.
    5. Andrew M. Pettigrew, 1990. "Longitudinal Field Research on Change: Theory and Practice," Organization Science, INFORMS, vol. 1(3), pages 267-292, August.
    6. Yan Chen & Dennis F. Galletta & Paul Benjamin Lowry & Xin (Robert) Luo & Gregory D. Moody & Robert Willison, 2021. "Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model," Information Systems Research, INFORMS, vol. 32(3), pages 1043-1065, September.
    7. Jacob Haislip & Jee-Hae Lim & Robert Pinsker, 2021. "The Impact of Executives’ IT Expertise on Reported Data Security Breaches," Information Systems Research, INFORMS, vol. 32(2), pages 318-334, June.
    8. Gianfranco Walsh & Edward Shiu & Louise Hassan & Patrick Hille & Ikuo Takahashi, 2019. "Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development," Information Systems Frontiers, Springer, vol. 21(6), pages 1251-1264, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Sagar Samtani & Ziming Zhao & Ram Krishnan, 2023. "Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence," Information Systems Frontiers, Springer, vol. 25(2), pages 425-429, April.
    2. Uddin, Mohammad Rajib & Akter, Shahriar & Lee, Wai Jin Thomas, 2024. "Developing a data breach protection capability framework in retailing," International Journal of Production Economics, Elsevier, vol. 271(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. A. F. Salam & Hua Dai & Lei Wang, 2022. "Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment," Information Systems Frontiers, Springer, vol. 24(6), pages 1929-1948, December.
    2. Davenport, Sally, 2005. "Exploring the role of proximity in SME knowledge-acquisition," Research Policy, Elsevier, vol. 34(5), pages 683-701, June.
    3. Nastasi, Federico & Spagano, Salvatore, 2023. "Institutionalist Clues in Celso Furtado’s Economic Thought," MPRA Paper 120242, University Library of Munich, Germany.
    4. Maximiliano Marzetti & Rok Spruk, 2023. "Long-Term Economic Effects of Populist Legal Reforms: Evidence from Argentina," Comparative Economic Studies, Palgrave Macmillan;Association for Comparative Economic Studies, vol. 65(1), pages 60-95, March.
    5. Robert Roßner & Dimitrios Zikos, 2018. "The Role of Homogeneity and Heterogeneity Among Resource Users on Water Governance: Lessons Learnt from an Economic Field Experiment on Irrigation in Uzbekistan," Water Economics and Policy (WEP), World Scientific Publishing Co. Pte. Ltd., vol. 4(03), pages 1-30, July.
    6. Battaglia, Daniele & Landoni, Paolo & Rizzitelli, Francesco, 2017. "Organizational structures for external growth of University Technology Transfer Offices: An explorative analysis," Technological Forecasting and Social Change, Elsevier, vol. 123(C), pages 45-56.
    7. Mika Kallioinen, 2017. "Inter‐communal institutions in medieval trade," Economic History Review, Economic History Society, vol. 70(4), pages 1131-1152, November.
    8. Luis Alfonso Dau & Aya S. Chacar & Marjorie A. Lyles & Jiatao Li, 2022. "Informal institutions and international business: Toward an integrative research agenda," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 53(6), pages 985-1010, August.
    9. Sternitzke, Christian, 2013. "An exploratory analysis of patent fencing in pharmaceuticals: The case of PDE5 inhibitors," Research Policy, Elsevier, vol. 42(2), pages 542-551.
    10. Gebauer, Heiko & Worch, Hagen & Truffer, Bernhard, 2012. "Absorptive capacity, learning processes and combinative capabilities as determinants of strategic innovation," European Management Journal, Elsevier, vol. 30(1), pages 57-73.
    11. Valentin Seidler, 2017. "Institutional Copying in the 20th Century: The Role of 14,000 British Colonial Officers," Journal of Contextual Economics (JCE) – Schmollers Jahrbuch, Duncker & Humblot, Berlin, vol. 137(1-2), pages 93-119.
    12. Masahiko Aoki, 2013. "Institutions as cognitive media between strategic interactions and individual beliefs," Chapters, in: Comparative Institutional Analysis, chapter 17, pages 298-312, Edward Elgar Publishing.
    13. Marletto, Gerardo, 2011. "Structure, agency and change in the car regime. A review of the literature," European Transport \ Trasporti Europei, ISTIEE, Institute for the Study of Transport within the European Economic Integration, issue 47, pages 71-88.
    14. Mariani, Marcello M. & Giorgio, Luisa, 2017. "The “Pink Night” festival revisited: Meta-events and the role of destination partnerships in staging event tourism," Annals of Tourism Research, Elsevier, vol. 62(C), pages 89-109.
    15. Simon Hartmann & Thomas Lindner & Jakob Müllner & Jonas Puck, 2022. "Beyond the nation-state: Anchoring supranational institutions in international business research," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 53(6), pages 1282-1306, August.
    16. George Liagouras, 2016. "From Heterodox Political Economy to Generalized Darwinism," Review of Radical Political Economics, Union for Radical Political Economics, vol. 48(3), pages 467-484, September.
    17. Innan Sasaki & Niina Nummela & Davide Ravasi, 2021. "Managing cultural specificity and cultural embeddedness when internationalizing: Cultural strategies of Japanese craft firms," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 52(2), pages 245-281, March.
    18. Bağış, Mehmet & Kryeziu, Liridon & Akbaba, Yılmaz & Ramadani, Veland & Karagüzel, Ensar Selman & Krasniqi, Besnik A., 2022. "The micro-foundations of a dynamic technological capability in the automotive industry," Technology in Society, Elsevier, vol. 70(C).
    19. Zoltán Bartha & Andrea S. Gubik, 2014. "Characteristics Of The Large Corporation-Based, Bureaucratic Model Among Oecd Countries – An Foi Model Analysis," DANUBE: Law and Economics Review, European Association Comenius - EACO, issue 1, pages 1-20, March.
    20. Renato Garcia & Ulisses Pereira dos Santos & Wilson Suzigan, 2020. "Industrial upgrade, economic catch-up and industrial policy in Brazil: general trends and the specific case of the mining industry [Upgrade industrial, catch-up econômico e política industrial no Bras," Nova Economia, Economics Department, Universidade Federal de Minas Gerais (Brazil), vol. 30(spe), pages 1089-1114, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:25:y:2023:i:2:d:10.1007_s10796-022-10326-w. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.