Exploring Information Security Controls Using Information Fraud Episodes: Case Study Evidence from a Large Telecommunications Firm

dc.contributor.authorGoode, Sigi
dc.contributor.authorLacey, David
dc.coverage.spatialHelsinki Finland
dc.date.accessioned2015-12-08T22:43:57Z
dc.date.available2015-12-08T22:43:57Z
dc.date.createdJune 9-11 2011
dc.date.issued2011
dc.date.updated2016-02-24T12:13:21Z
dc.description.abstractFraud and security continue to be problems for firms. Fraud information is typically incomplete and deliberately obfuscated. These qualities make fraud events harder to detect using conventional security controls. This study uses a knowledge management framework to explore how different types of controls are used to detect and investigate information fraud. The analysis is based on the customer fraud database of a large Asia-Pacific telecommunications provider. Semi-structured interviews were also conducted with the firm's fraud unit. The study finds that IS controls, with high task programmability and outcome measurement, are used to detect the majority of fraud cases. However, more complex fraud cases use clan controls for detection. The paper also provides insight into the way in which combinations of controls are used to investigate cases. The study raises implications for both theory and practice.
dc.identifier.urihttp://hdl.handle.net/1885/37425
dc.publisherAIS Electronic Library (AISeL)
dc.relation.ispartofseriesEuropean Conference on Information Systems (EICS 2011)
dc.sourceECIS 2011 Proceedings
dc.source.urihttp://aisel.aisnet.org/ecis2011/191/
dc.source.urihttp://www.ecis2011.fi/program/submission-of-papers/index.html
dc.subjectKeywords: Information fraud; Information security controls; Information sharing; Knowledge management framework; Programmability; Security controls; Semi structured interviews; Telecommunications firms; Telecommunications providers; Theory and practice; Computer cr Control; Information fraud; Information sharing; Telecommunications
dc.titleExploring Information Security Controls Using Information Fraud Episodes: Case Study Evidence from a Large Telecommunications Firm
dc.typeConference paper
local.bibliographicCitation.lastpage13
local.bibliographicCitation.startpage1
local.contributor.affiliationGoode, Sigi, College of Business and Economics, ANU
local.contributor.affiliationLacey, David, College of Business and Economics, ANU
local.contributor.authoruidGoode, Sigi, u9404841
local.contributor.authoruidLacey, David, u4490189
local.description.notesImported from ARIES
local.description.refereedYes
local.identifier.absfor080611 - Information Systems Theory
local.identifier.ariespublicationu9900263xPUB148
local.identifier.scopusID2-s2.0-84870643503
local.type.statusPublished Version

Downloads