Results for 'Online fraud'

1000+ found
Order:
  1.  23
    Cheques or dating scams? Online fraud themes in hip-hop songs across popular music apps.Suleman Lazarus, Olaigbe Olaigbe, Ayo Adeduntan, Tochukwu Dibiana, Edward & Uzoma OKolorie, Geoffrey - 2023 - Journal of Economic Criminology 2:1-17.
    How do hip-hop songs produced from 2017 to 2023 depict and rationalize online fraud? This study examines the depiction of online fraudsters in thirty-three Nigerian hip-hop songs on nine popular streaming platforms such as Spotify, Deezer, iTunes, SoundCloud, Apple Music, and YouTube. Using a directed approach to qualitative content analysis, we coded lyrics based on the moral disengagement mechanism and core themes derived from existing literature. Our findings shed light on how songs (a) justify the fraudulent actions (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  56
    Online Auction Fraud: Ethical Perspective.Alex Nikitkov & Darlene Bay - 2008 - Journal of Business Ethics 79 (3):235-244.
    Internet fraud is an issue that increasingly concerns regulators, consumers, firms, and business ethics researchers. In this article, we examine one common form of internet fraud, the practice of shill bidding (when a seller in an auction enters a bid on his or her own item). The significant incidence of shill bidding on eBay (in spite of the fact that it is illegal just as it is in live auctions) exemplifies the current ineffectiveness of regulatory means as well (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  23
    An examination of online cheating among business students through the lens of the Dark Triad and Fraud Diamond.Kenneth Smith, David Emerson, Timothy Haight & Bob Wood - 2023 - Ethics and Behavior 33 (6):433-460.
    Business students have long been noted for their differential proclivity to engage in academic misconduct. Unfortunately, the potential for misconduct has been exacerbated in recent years by rapid advances in technology, easy access to information, competitive pressures, and the proliferation of websites that provide students access to information that allows them to directly circumvent the learning process. Using a convenience sample of 631 students matriculating in various business majors at four U.S. universities and structural equations modeling procedures, this study assesses (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering” (Sha Zhu Pan, 杀猪盘).Jack Whittaker, Suleman Lazarus & Taidgh Corcoran - 2024 - Journal of Economic Criminology 3.
    This is a theoretical treatment of the term "Sha Zhu Pan" (杀猪盘) in Chinese, which translates to “Pig-Butchering” in English. The article critically examines the propagation and validation of "Pig Butchering," an animal metaphor, and its implications for the dehumanisation of victims of online fraud across various discourses. The study provides background information about this type of fraud before investigating its theoretical foundations and linking its emergence to the dehumanisation of fraud victims. The analysis highlights the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  5
    Academic Fraud and Remote Evaluation of Accounting Students: An Application of the Fraud Triangle.James Bierstaker, William D. Brink, Sameera Khatoon & Linda Thorne - forthcoming - Journal of Business Ethics:1-23.
    The pandemic has altered accounting education with the widespread adoption of remote evaluation platforms. We apply the lens of the fraud triangle to consider how the adoption of remote evaluation influences accounting students’ ethical values by measuring the incidence of cheating behavior as well as capturing their perceptions of their opportunity to cheat and their rationalization of cheating behavior. Consistent with prior research, our results show that cheating is higher in the online environment compared to remote evaluation, although (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  76
    Fraud from the frontlines: the importance of being nice: David Goodstein: On fact and fraud: Cautionary tales from the front lines of science. Princeton: Princeton University Press, 184pp, £15.95 HB. [REVIEW]Heather Douglas - 2010 - Metascience 20 (3):553-556.
    Fraud from the frontlines: the importance of being nice Content Type Journal Article DOI 10.1007/s11016-010-9492-2 Authors Heather Douglas, Department of Philosophy, University of Tennessee at Knoxville, 815 McClung Tower, Knoxville, TN 37996-0480, USA Journal Metascience Online ISSN 1467-9981 Print ISSN 0815-0796.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  8.  13
    The psychology of the internet fraud victimization of older adults: A systematic review.Yuxi Shang, Zhongxian Wu, Xiaoyu Du, Yanbin Jiang, Beibei Ma & Meihong Chi - 2022 - Frontiers in Psychology 13.
    Criminals targeting and exploiting older adults in online environments are of great concern. This study systematically retrieved and analyzed articles on the psychological characteristics of older adult victims of online fraud. First, we found that there was no evidence that older adults were more prevalent than other individuals of other ages among online fraud victims, and current researchers have focused more on why older adults are easy targets for fraud. Second, research on psychological factors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  46
    The Nature of and Conditions for Online Trust.Daryl Koehn - 2003 - Journal of Business Ethics 43 (1/2):3 - 19.
    As use of the Internet has increased, many issues of trust have arisen. Users wonder: will may privacy be protected if I provide information to this Internet vendor? Will my credit card remain secure? Should I trust that this party will deliver the goods? Will the goods be as described? These questions are not merely academic. A recent Boston Consulting Group study revealed that one out of ten consumers have ordered and paid for items online that never were delivered (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  10.  35
    Contributors to this issue.5/06Published Online: - 2008 - Naharaim - Zeitschrift Für Deutsch-Jüdische Literatur Und Kulturgeschichte 2 (1):2-2.
  11. Discussion.5/06Published Online: - 2008 - Naharaim - Zeitschrift Für Deutsch-Jüdische Literatur Und Kulturgeschichte 2 (1).
     
    Export citation  
     
    Bookmark  
  12.  33
    Contributors to this issue.Online:19/03Published - 2009 - Naharaim - Zeitschrift Für Deutsch-Jüdische Literatur Und Kulturgeschichte 3 (1):2-2.
  13. Erratum.Online:10/03Published - 2010 - Archiv für Geschichte der Philosophie 92 (1).
     
    Export citation  
     
    Bookmark  
  14.  26
    Exploring the value of feminist theory in understanding digital crimes: Gender and cybercrime types.Suleman Lazarus, Mark Button & Richard Kapend - 2022 - Howard Journal of Crime and Justice 1 (1):1-18.
    Do men and women perceive cybercrime types differently? This article draws on the distinction between socio-economic and psychosocial cybercrime proposed by Lazarus (2019) to investigate whether men and women hold different perceptions of digital crimes across these two dimensions. Informed by the synergy between feminist theory and the Tripartite Cybercrime Framework (TCF), our survey examined respondents’ differential perceptions of socio-economic cybercrime (online fraud) and psychosocial cybercrime (cyberbullying, revenge porn, cyberstalking, online harassment) among men and women in the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  42
    Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others. The basis of modern privacy laws and practices around the world, informational privacy has become a challenging concept to protect and promote in a world of ubiquitous and unlimited data sharing and storage among organizations. The paper advocates a “user-centric” approach to managing personal data online. However, user-centricity can be problematic when the user—the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16. Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”).Suleman Lazarus, Mark Button & Afe Adogame - 2022 - Heliyon Journal 8 (11):1-10.
    This article is about the manifestations of similarities between two seemingly distinct groups of Nigerians: cybercriminals and politicians. Which linguistic strategies do Twitter users use to express their opinions on cybercriminals and politicians? The study undertakes a qualitative analysis of ‘engaged’ tweets of an elite law enforcement agency in West Africa. We analyzed and coded over 100,000 ‘engaged’ tweets based on a component of mechanisms of moral disengagement (i.e., advantageous comparison), a linguistic device. The results reveal how respondents defend the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  21
    When Lying Feels the Right Thing to Do.Sophie Van Der Zee, Ross Anderson & Ronald Poppe - 2016 - Frontiers in Psychology 7:169277.
    Fraud is a pervasive and challenging problem that costs society large amounts of money. By no means all fraud is committed by ‘professional criminals’: much is done by ordinary people who indulge in small-scale opportunistic deception. In this paper, we set out to investigate when people behave dishonestly, for example by committing fraud, in an online context. We conducted three studies to investigate how the rejection of one’s efforts, operationalized in different ways, affected the amount of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  23
    Tweets and reactions: revealing the geographies of cybercrime perpetrators and the North-South divide.Suleman Lazarus & Mark Button - 2022 - CyberPsychology, Behavior, and Social Networking 8 (1):1-8.
    How do tweets reflect the long-standing disparities between the northern and southern regions of Nigeria? This study presents a qualitative analysis of Twitter users' responses (n = 101,518) to the tweets of the Economic and Financial Crimes Commission (EFCC) regarding the production and prosecution of cybercrime. The article uses postcolonial perspectives to shed light on the legacies of British colonial efforts in Nigeria, such as the amalgamation of the northern and southern protectorates in 1914. The results revealed significant discrepancies between (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  84
    The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Fraudulent participation in psychological research using virtual synchronous interviews: ethical challenges and potential solutions.Kaitlyn McLachlan, Emma E. Truffyn, Bianka Dunleavy, Delane Linkiewich, Deborah Powell, Anna Taddio & C. Meghan McMurtry - forthcoming - Ethics and Behavior.
    Online research offers advantages including recruitment cost, diminished equity-related participation barriers, and convenience; however, there are growing concerns regarding fraudulent participation. Guidance to navigate these challenges exists for online research generally (e.g. surveys), but remains sparse for the specific challenge of fraudulent participation within virtual synchronous interviews. No work has explored this topic within an explicit, detailed ethical framework. Reflecting on our experiences navigating fraudulent participation in virtual synchronous research, we address this gap using the Canadian Code of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  13
    Pretending to Be Better Than They Are? Emotional Manipulation in Imprisoned Fraudsters.Qianglong Wang, Zhenbiao Liu, Edward M. Bernat, Anthony A. Vivino, Zilu Liang, Shuliang Bai, Chao Liu, Bo Yang & Zhuo Zhang - 2021 - Frontiers in Psychology 12.
    Fraud can cause severe financial losses and affect the physical and mental health of victims. This study aimed to explore the manipulative characteristics of fraudsters and their relationship with other psychological variables. Thirty-four fraudsters were selected from a medium-security prison in China, and thirty-one healthy participants were recruited online. Both groups completed an emotional face-recognition task and self-report measures assaying emotional manipulation, psychopathy, emotion recognition, and empathy. Results showed that imprisoned fraudsters had higher accuracy in identifying fear and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  11
    Ambivalence, Creative Investment, Publishing and Development.Ignace Haaz - 2022 - Journal of Ethics in Higher Education (1):103-121.
    The role of an academic editor and publisher is not simple. It is even less so when providing guidance and support for authors from the countries of the majority world becomes a habitual condition of this activity. Editorial commitment in this context becomes ambivalent, as it has to be oriented towards meeting two distinct objectives: ensuring academic quality and providing support to authors. To meet this challenge the publisher hopes to make the most of online tools and networks. If (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  23.  10
    Who Responds to Phishing Emails? An International Investigation of 15-Year-Olds Using PISA Data.John Jerrim - 2023 - British Journal of Educational Studies 71 (6):701-724.
    Young people are facing an ever-increasing array of online dangers. One of the most common is receipt of a phishing email. This paper presents new evidence on the characteristics of young people most likely to respond to such emails. I find approximately one-in-seven 15-year-olds are at risk of responding to a phishing email, rising to one-in-five amongst those from disadvantaged socio-economic backgrounds. Such risks are particularly high amongst young people with low levels of cognitive skill. Unfortunately, students who are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  7
    Retractions in cancer research: a systematic survey.Michelle Ghert, Nathan Evaniew, Kamal Bali & Anthony Bozzo - 2017 - Research Integrity and Peer Review 2 (1).
    BackgroundThe annual number of retracted publications in the scientific literature is rapidly increasing. The objective of this study was to determine the frequency and reason for retraction of cancer publications and to determine how journals in the cancer field handle retracted articles.MethodsWe searched three online databases (MEDLINE, Embase, The Cochrane Library) from database inception until 2015 for retracted journal publications related to cancer research. For each article, the reason for retraction was categorized as plagiarism, duplicate publication, fraud, error, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  25. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, cyber‐ (...), revenge porn, and cyber‐stalking to demonstrate that who is victimised, why, and to what effect are the critical starting points for the analysis of the connections between gender and crimes. In turn, it uses the lens of intersectionality to acknowledge that, while conceptions of gender and crime interact, they intersect with other categories (e.g., sexuality) to provide additional layers of explanation. To nuance the utilitarian value of the synergy between the TCF and the feminist perspectives, the focus shifts to a recent case study (which compared socioeconomic and psychosocial cybercrimes). The article concludes that, while online and offline lives are inextricably intertwined, the victimisations in psychosocial cybercrimes may be more gendered than in socioeconomic cybercrimes. These contributions align the TCF to the feminist epistemology of crime in their attempt to move gender analysis of digital crimes “from margin to centre”. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  26.  22
    Social Media as a Form of Virtual Whistleblowing: Empirical Evidence for Elements of the Diamond Model.Hengky Latan, Charbel Jose Chiappetta Jabbour & Ana Beatriz Lopes de Sousa Jabbour - 2020 - Journal of Business Ethics 174 (3):529-548.
    This article originally advances the field of organizational whistleblowing by empirically investigating the suitability of the four elements of the fraud diamond as a means to understand the intention to disclose wrongdoing through virtual channels. This article also makes a contribution on the theme of whistleblowing as it relates to customers, an under-studied, however, relevant stakeholder in this field. The main findings of the article are as follows: the four elements of the fraud diamond as they relate to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  27.  18
    A crisis that changed the banking scenario in India: exploring the role of ethics in business.Sushma Nayak & Jyoti Chandiramani - 2022 - Asian Journal of Business Ethics 11 (1):7-32.
    Digital business has marked an era of transformation, but also an unprecedented growth of cyber threats. While digital explosion witnessed by the banking sector since the COVID-19 pandemic has been significant, the level and frequency of cybercrimes have gone up as well. Cybercrime officials attribute it to remote working—people using home computers or laptops with vulnerable online security than office systems; malicious actors relentlessly developing their tactics to find new ways to break into enterprise networks and grasping defence evasion; (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  32
    Detecting, Preventing, and Responding to “Fraudsters” in Internet Research: Ethics and Tradeoffs.Jennifer E. F. Teitcher, Walter O. Bockting, José A. Bauermeister, Chris J. Hoefer, Michael H. Miner & Robert L. Klitzman - 2015 - Journal of Law, Medicine and Ethics 43 (1):116-133.
    Internet-based health research is increasing, and often offers financial incentives but fraudulent behavior by participants can result. Specifically, eligible or ineligible individuals may enter the study multiple times and receive undeserved financial compensation. We review past experiences and approaches to this problem and propose several new strategies. Researchers can detect and prevent Internet research fraud in four broad ways: through the questionnaire/instrument ; through participants' non-questionnaire data and seeking external validation through computer information,, and 4) through study design. These (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  29.  34
    Fake news? A critical analysis of the ‘Welfare Cheats, Cheat Us All’ campaign in Ireland.Eoin Devereux & Martin J. Power - 2019 - Critical Discourse Studies 16 (3):347-362.
    ABSTRACTUsing qualitative content analysis, informed by a Critical Discourse Analysis approach, this article examines the production, content and reception of print and online media discourses concerning the 2017 ‘Welfare Cheats, Cheat Us All’ campaign in the Republic of Ireland. Our article is situated in the context of recent debates concerning the media’s role in articulating ‘disgust’ discourses focused on ‘welfare fraud’, poverty and unemployment. Central to these processes is the social construction of those who are deemed to be (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  30.  86
    Ethical issues in electronic comemrce.Bette Ann Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75 - 85.
    This article reviews the incredible growth of electronic commerce (e-commerce) and presents ethical issues that have emerged. Security concerns, spamming, Web sites that do not carry an "advertising" label, cybersquatters, online marketing to children, conflicts of interest, manufacturers competing with intermediaries online, and "dinosaurs" are discussed. The power of the Internet to spotlight issues is noted as a significant force in providing a kind of self-regulation that supports an ethical e-commerce environment.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  31.  11
    Keeping It in “the Family”: How Gender Norms Shape U.S. Marriage Migration Politics.Gina Marie Longo - 2018 - Gender and Society 32 (4):469-492.
    Foreign nationals who marry U.S. citizens have an expedited track to naturalization. U.S. immigration officials require that “green card” petitioning couples demonstrate that their relationships are “valid and subsisting” and not fraudulent. These requirements are ostensibly gender and racially neutral, but migration itself is not; men and women petitioners seek partners in different regions and solicit advice from similar others about the potential obstacles to their petitions’ success. Using an online ethnography and textual analysis of conversation threads on a (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  14
    Introduction: A sociosemiotic exploration of identity and discourse. Le Cheng, Ning Ye & David Machin - 2020 - Semiotica 2020 (236-237):395-404.
    Among the categories of the telecom and internet frauds, the online romance scam is of particular concern for its sharp rise of victim numbers and the huge amount of cost. A social semiotic approach could be used to investigate the victim identity of the online romance scam from the aspects of the (re)construction and interpretation of discursive practices. The range of papers in this section shows that the study of text, context and the way that people use semiotic (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  42
    Tenure is justifiable.W. Bentley MacLeod - 2006 - Behavioral and Brain Sciences 29 (6):581-583.
    The target article by Ceci et al. provides some interesting results regarding how faculty might react to difficult social dilemmas, but it has little to say about tenure and its effect upon academic freedom. This comment discusses briefly what we know about tenure, and employment protection more generally, and why it may be in a university's best interest to hire tenured faculty. The comment concludes by pointing out that the results make a rather useful contribution regarding the difficulty of eliciting (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  34.  16
    ‘We Attempted to Deliver Your Package’: Forensic Translation in the Fight Against Cross-Border Cybercrime.Rui Sousa-Silva - forthcoming - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique:1-27.
    Cybercrime has increased significantly, recently, as a result of both individual and group criminal practice, and is now a threat to individuals, organisations, and democratic systems worldwide. However, cybercrime raises two main challenges for legal systems: firstly, because cybercriminals operate online, cybercrime spans beyond the boundaries of specific jurisdictions, which constrains the operation of the police and, subsequently, the conviction of the perpetrators; secondly, since cybercriminals can operate from anywhere in the world, law enforcement agencies struggle to identify the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  6
    The discourse of digital deceptions and ‘419’ emails.Innocent Chiluwa - 2009 - Discourse Studies 11 (6):635-660.
    This study applies a computer-mediated discourse analysis to the study of discourse structures and functions of ‘419’ emails — the Nigerian term for online/financial fraud. The hoax mails are in the form of online lottery winning announcements, and email ‘business proposals’ involving money transfers/claims of dormant bank accounts overseas. Data comprise 68 email samples collected from the researcher’s inboxes and colleagues’ and students’ mail boxes between January 2008 and March 2009 in Ota, Nigeria. The study reveals that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  19
    Your urgent assistance is requested: The intersection of 419 spam and new networks of imagination.Matthew Zook - 2007 - Ethics, Place and Environment 10 (1):65 – 88.
    This article introduces a series of measures of the geographical manifestation of a subset of unsolicited commercial email, i.e. spam, used to perpetrate 'advanced fee fraud'. Known as '419 spam', this activity has strong historic ties to Nigeria, where similar frauds were operated via physical letters and faxes during the 1970s and 1980s. This article's analysis reveals that 419 spam operates via a globally dispersed network that nevertheless contains a clear agglomeration of activity in West Africa. Building upon theories (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  9
    Students’ Perceptions of University Corruption in a Spanish Public University: A Path Analysis.Martín Julián & Tomas Bonavia - 2022 - Frontiers in Psychology 13.
    Most research on corruption in educational settings has focused on a cross-national and macro-level analysis; however, to our knowledge, few papers have sought to explore individual perceptions that explain corruption in higher education. The present research aimed to disentangle students’ predictors of corrupt intention in a Spanish public university. A total of 933 undergraduate, postgraduate, and Ph.D. students filled out an online survey measuring four corruption scenarios: favoritism, bribery, fraud, and embezzlement. Path analysis revealed that justifiability, risk perception, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  6
    Friction, snake oil, and weird countries: Cybersecurity systems could deepen global inequality through regional blocking.Jenna Burrell & Anne Jonas - 2019 - Big Data and Society 6 (1).
    In this moment of rising nationalism worldwide, governments, civil society groups, transnational companies, and web users all complain of increasing regional fragmentation online. While prior work in this area has primarily focused on issues of government censorship and regulatory compliance, we use an inductive and qualitative approach to examine targeted blocking by corporate entities of entire regions motivated by concerns about fraud, abuse, and theft. Through participant-observation at relevant events and intensive interviews with experts, we document the quest (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  77
    Susceptibility to COVID-19 Scams: The Roles of Age, Individual Difference Measures, and Scam-Related Perceptions.Julia Nolte, Yaniv Hanoch, Stacey Wood & David Hengerer - 2021 - Frontiers in Psychology 12.
    As the COVID-19 pandemic was unfolding, a surge in scams was registered across the globe. While COVID-19 poses higher health risks for older adults, it is unknown whether older adults are also facing higher financial risks as a result of COVID-19 scams. Here, we examined age differences in vulnerability to COVID-19 scams and individual difference measures that might help explain them. A lifespan sample of sixty-eight younger, 79 middle-aged, and 63 older adults recruited through Prolific completed questions and questionnaires (...). In a within-subjects design, each participant responded to five COVID-19 solicitations, psychological measures, and demographic questions. Age group comparisons revealed that older adults were marginally less likely to perceive COVID-19 solicitations as genuine than middle-aged adults were. In addition, older adults perceived significantly fewer benefits than both younger and middle-aged adults did and perceived marginally higher risks than younger adults did. Hence, older adults did not exhibit greater vulnerability to COVID-19 scams. Regardless of age, intentions to respond to COVID-19 solicitations were positively predicted by higher levels of educational attainment, being married, past fraud victimization, and higher levels of positive urgency. As expected, stronger genuineness and benefit perceptions positively predicted action intentions, whereas stronger risk perceptions negatively predicted action intentions As such, COVID-19 scam susceptibility appears to be the result of a impulse control issue that is not easily inhibited, not even by past experiences of scam victimization. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  24
    Scholars’ preferred solutions for research misconduct: results from a survey of faculty members at America’s top 100 research universities.Travis C. Pratt, Michael D. Reisig, Kristy Holtfreter & Katelyn A. Golladay - 2019 - Ethics and Behavior 29 (7):510-530.
    Research misconduct is harmful because it threatens public health and public safety, and also undermines public confidence in science. Efforts to eradicate ongoing and prevent future misconduct are numerous and varied, yet the question of “what works” remains largely unanswered. To shed light on this issue, this study used data from both mail and online surveys administered to a stratified random sample of tenured and tenure-track faculty members (N = 613) in the social, natural, and applied sciences at America’s (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  61
    The Dawning of the Ethics of Environmental Robots.Justin Donhauser & Aimee van Wynsberghe - Online First - 2 - Science and Engineering Ethics 24 (6):1777-1800.
    Environmental scientists and engineers have been exploring research and monitoring applications of robotics, as well as exploring ways of integrating robotics into ecosystems to aid in responses to accelerating environmental, climatic, and biodiversity changes. These emerging applications of robots and other autonomous technologies present novel ethical and practical challenges. Yet, the critical applications of robots for environmental research, engineering, protection and remediation have received next to no attention in the ethics of robotics literature to date. This paper seeks to fill (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  42.  77
    Augustine and Aquinas on Demonic Possession in advance.Seamus O'Neill - 2017 Online Firs - Proceedings of the American Catholic Philosophical Association.
    Augustine asserted that demons (and angels) have material bodies, while Aquinas denied demonic corporeality, upholding that demons are separated, incorporeal, intelligible substances. Augustine’s conception of demons as composite substances possessing an immaterial soul and an aerial body is insufficient, in Thomas’s view, to account for certain empirical phenomena observed in demoniacs. However, Thomas, while providing more detailed accounts of demonic possession according to his development of Aristotelian psychology, does not avail of this demonic incorporeal eminence when analysing demonic attacks: demonic (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43. Encountering Evil: The Evil-god Challenge from Religious Experience.Asha Lancaster-Thomas - 11th July Online - European Journal for Philosophy of Religion 12 (3):0-0.
    It is often thought that religious experiences provide support for the cumulative case for the existence of the God of classical monotheism. In this paper, I formulate an Evil-god challenge that invites classical monotheists to explain why, based on evidence from religious experience, the belief in an omnipotent, omniscient, omnibenevolent god is significantly more reasonable than the belief in an omnipotent, omniscient, evil god. I demonstrate that religious experiences substantiate the existence of Evil-god more so than they do the existence (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44. On fraud.Liam Kofi Bright - 2017 - Philosophical Studies 174 (2):291-310.
    Preferably scientific investigations would promote true rather than false beliefs. The phenomenon of fraud represents a standing challenge to this veritistic ideal. When scientists publish fraudulent results they knowingly enter falsehoods into the information stream of science. Recognition of this challenge has prompted calls for scientists to more consciously adopt the veritistic ideal in their own work. In this paper I argue against such promotion of the veritistic ideal. It turns out that a sincere desire on the part of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  45.  64
    Corporate Fraud and Managers’ Behavior: Evidence from the Press.Jeffrey Cohen, Yuan Ding, Cédric Lesage & Hervé Stolowy - 2010 - Journal of Business Ethics 95 (S2):271-315.
    Based on evidence from press articles covering 39 corporate fraud cases that went public during the period 1992-2005, the objective of this article is to examine the role of managers' behavior in the commitment of the fraud. This study integrates the fraud triangle (FT) and the theory of planned behavior (TPB) to gain a better understanding of fraud cases. The results of the analysis suggest that personality traits appear to be a major fraud-risk factor. The (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  46. Returnee executives and corporate fraud: Evidence from China.Ping Zeng, Ge Ren & Xi Zhong - forthcoming - Business Ethics, the Environment and Responsibility.
    Whether and when returnee executives influence corporate fraud remains an important unresolved theoretical and practical problem. Referencing upper echelons theory and the literature on managerial discretion, we propose that firms with more returnee executives are more likely to engage in corporate fraud. In addition, we propose that the relation between returnee executives and corporate fraud is subject to organizational indicators that reflect executives’ managerial discretion. Specifically, we propose that long-term performance surplus and corporate visibility diminish the positive (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  12
    Frauds in scientific research and how to possibly overcome them.Erik Boetto, Davide Golinelli, Gherardo Carullo & Maria Pia Fantini - 2021 - Journal of Medical Ethics 47 (12):e19-e19.
    Frauds and misconduct have been common in the history of science. Recent events connected to the COVID-19 pandemic have highlighted how the risks and consequences of this are no longer acceptable. Two papers, addressing the treatment of COVID-19, have been published in two of the most prestigious medical journals; the authors declared to have analysed electronic health records from a private corporation, which apparently collected data of tens of thousands of patients, coming from hundreds of hospitals. Both papers have been (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  89
    Fraud, Enforcement Action, and the Role of Corporate Governance: Evidence from China.Chunxin Jia, Shujun Ding, Yuanshun Li & Zhenyu Wu - 2009 - Journal of Business Ethics 90 (4):561-576.
    We examine enforcement action in China’s emerging markets by focusing on the agents that impose this action and the role played by supervisory boards. Using newly available databases, we find that supervisory boards play an active role when Chinese listed companies face enforcement action. Listed firms with larger supervisory boards are more likely to have more severe sanctions imposed upon them by the China Security Regulatory Commission, and listed companies that face more severe enforcement actions have more supervisory board meetings. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  49.  17
    Fraud and misconduct in research: detection, investigation, and organizational response.Nachman Ben-Yehuda - 2017 - Ann Arbor: University of Michigan Press. Edited by Amalya Lumerman Oliver.
    Introduction -- Fraud in research : frequency patterns -- An organizational approach to research fraud -- Fraud, lies, deceptions, fabrications, and falsifications -- Deviance in scientific research : norms, hot spots, control -- Concluding discussion.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  7
    Fraud and misconduct in medical research.Stephen Lock & Frank O. Wells (eds.) - 1993 - London: BMJ.
    A review of fraud in medical research in Britain, Europe, the USA and Australia. It includes a history of known cases of fraud since 1974 and discusses ways for detecting and dealing with fraud that have been devised by government agencies, pharmaceutical companies, academic institutions and scientific publications (especially medical journals).
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
1 — 50 / 1000