• Corpus ID: 36466820

Combatting Online Fraud in Saudi Arabia Using General Deterrence Theory (GDT)

  title={Combatting Online Fraud in Saudi Arabia Using General Deterrence Theory (GDT)},
  author={Faisal Alanezi and Laurence D. Brooks},
Online fraud, described as dubious business transactions and deceit carried out electronically, has reached an alarming rate worldwide and has become a major challenge to organizations and governments. [] Key Result Deterrence, prevention, detection and remedy activities, together making General Deterrence Theory (GDT) as an approach for systematically and effectively combatting online fraud in Saudi.

Figures and Tables from this paper

Control of fraud on mobile money services in Ghana: an exploratory study
Purpose Fraud is a global economic menace which threatens the survival of individuals, firms, industries and economies, and the mobile money service is no exception. This paper aims to explore the
Enhancing Data Breach Risk Management: A Case Study of Kenyan Commercial Banks
  • Silas Nzuva
  • Business, Computer Science
    International Journal of Engineering Trends and Technology
  • 2019
The results of the study indicated that the Kenyan Commercial banks have average risk avoidance measures, are reluctant to transfer their risks to third parties through outsourcing, and lack robust risk mitigation measures, specifically business continuity plan and disaster recovery plans.
Investigating identity fraud management practices in e-tail sector: a systematic review
The research finds that literature on practices for identity fraud management is scattered and reveals that firms assume identity fraud issues as a technological challenge, which is one of the major reasons for a gap in effective management of identity frauds.
Occurrences of online fraud complaints: 2002 through 2015
Purpose The purpose of this paper is to report on the findings and lessons that were learned from the many cases of internet fraud complaints that are gathered by the Federal Trade
Financial and other frauds in the United States: a panel analysis approach
Purpose - The purpose of this paper is to report on the findings and implications associated with the millions of financial and other fraud complaints that are reported to the Federal Trade
Critical Evaluation of the Challenges Associated With Information System Security Awareness
Information System Security Awareness and Behaviour Competence Model (ISSABCM) is developed and suggested for the UAE law enforcement agencies that matches with their culture as well as fill the gaps in existing awareness models.
When the Winning Move is Not to Play: Games of Deterrence in Cyber Security
The role deterrence can play as part of the security of individuals against the low-focus, low-skill attacks that pervade the Internet, and multiple equilibria are found that demonstrate aspects of deterrence within specific bounds of utility.
When Lying Feels the Right Thing to Do
It is indicated that rejection causes people to behave more dishonestly, specifically in online settings, and firms wishing to deter customers and employees from committing fraud may therefore benefit from transparency and clear policy guidelines, discouraging people to submit claims that are likely to be rejected.
Explaining online communities’ contribution to socio-economic development
In recent times, online communities are emerging as a potential source of information technology-led socio-economic development by enabling new generative mechanisms. Existing studies provide useful


Study on e-government information misuse based on General Deterrence Theory
The findings indicated that static information security policies only can take effects when the policies are conveyed to employees clearly and the punishment is carried out well and preventative software is still the strongest measure for e-government security.
E-commerce and E-commerce Fraud in Saudi Arabia: A Case Study
  • S. Alfuraih
  • Business
    2008 International Conference on Information Security and Assurance (isa 2008)
  • 2008
The choice of Saudi Arabia for this study arose from two factors: Saudi is a growing market for e- commerce and disputes, and some important information was needed to be collected to test the proposed e-commerce taxonomy, and Saudi has less strict privacy rules.
Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
The study draws on the compliance theory and the general deterrence theory to propose a research model in which the relations among coercive control, remunerative control, which is generally missing in both research and practice; and certainty of control are studied.
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
An extended deterrence theory model is presented that combines work from criminology, social psychology, and information systems and suggests that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention.
Essentials of Online payment Security and Fraud Prevention
Essentials of On-line Payment Security and Fraud Prevention equips you to prevent fraud in the CNP space and reveals the top 45 fraud prevention techniques.
E-Buyer Beware: Why Online Auction Fraud Should Be Regulated
Well-settled principles of law, such as those encompassing fraud in its various forms, have long maintained their vitality, adapting to changes in the legal and business environments through judicial
Security issues concern for E-Learning by Saudi universities
Some of the issues in an E-Learning environment particularly in Saudi Arabia are discussed and suggestions and possible solutions are provided to provide some of these problems.
In defense of the realm: understanding the threats to information security
Coping With Systems Risk: Security Planning Models for Management Decision Making
Results of comparative qualitative studies in two information services Fortune 500 firms identify an approach that can effectively deal with systems risk, and this theory-based security program includes use of a security risk planning model, education/training in security awareness, and Countermeasure Matrix analysis.