Synthesis of Systematic Analysis Results Assignment. https://studentshare.org/social-science/2052272-table-reference
Synthesis of Systematic Analysis Results Assignment. https://studentshare.org/social-science/2052272-table-reference.
Studies
Key findings
Method & scope
Main theories & Hypothesis
Variables
Limitation/ future research
Country
Notes
Anderson J, (2010)
‘Understanding the Changing Needs of the U.S. Online Consumer’
- With how online and mobile behaviors are changing, the research sought to find effective approaches to the integration of services provided within and
between public service organizations, including the use of IT-based
platforms within Saudi Arabia
- Innovative approaches to public consultation/involvement
-The research mainly used primary data which in the case was interviewing respondents from key organizations and financial institutions within Abu Dhabi. The research identified five respondents from every organization thus expected to interview 50 respondents
The relationship between public welfare services and
social exclusion within the context of the introduction of E-services
Public welfare services and social exclusion
Limitation
The study was narrowed within specific sectors of activity (e.g. central or local government), therefore the evidence suggests that it is important to seek to establish research on wider sectors.
United Arabs Emirates (UAE)
The researcher adopted primary data since it was essential due to a large number of the respondent and the larger area which was to be covered.
Applegate (2002)
‘Million invested in fighting cybercrime around the world’
Key findings
The most appealing and distinct nature of cybercrime. The second finding was models of crime when dealing with cyber fraud and know how to investigate it.
Method
-The was the application of primary that was gathered through interviews and questionnaire
-It was also comparative research that used interviews and online surveys on workers in non-governmental and governmental organizations.
Hypothesis
-Should the government continue to spend millions in fighting cybercrime around the world?
Telecommunications and Information Technology in the Kingdom of Saudi Arabia databases
Variables
Amount of money spent (in terms of millions used) and the outcome of strategies the spent millions leverage on
Future research
While the scope of the study seemed feasible, there is a need to evaluate the feasibility of a one-stop-shop approach with other departments where there is a common customer base.
United Kingdom (UK)
Notes
A qualitative survey was done on the 20 different organizations including public and private ones
Ball, S. (2007)
‘ Bystanders and bullying: A summary of research for Anti-Bullying Week’
Key findings
The best way to take more of an enterprise-wide approach to Anti-Bullying by building a new cross-department organization with accountability and governance.
Method
The research adopted the model of testing and verifying a significant number of hypotheses and models as part of the methodology in the study.
Hypothesis
The second hypothesis was accountability and governance for service delivery
Variables
Total incidences of cyberbullying in terms of millions by UAE and the outcome of strategies
Limitation
The study population was limited to smaller region within one of the emirates hence risky
Future research
Finding better ways of integrating the research with available ways of collaboration with private
sectors’ leaders such as financial institutions.
United Arab Emirates (UAE)
Notes
-The models tested were many hence gave the research a more accurate outcome
Bandura, A. (2003)
‘Aggression: A social learning analysis’
Key findings
Strategies of proactively migrating service interactions with both citizens and businesses to a single point of entry service centers, call centers, and lower cost internet channels.
Method
Unlike previous researches adopted by the author, the research relied on secondary data where journals and articles were key sources of information.
Hypothesis
Streamlining organizational culture and its effects on the adoption of E-commerce
Variables
Business research and methodology used
Future research
In the same way that the private sector focuses on
the bottom line, future studies need to explore more on how entrepreneurialism is required to drive
government forward
Australia
Notes
The data obtained may not be able to provide the needed results since the authors in the journals cited some limitations too.
Barlinska, J., & Wojtasik, Ł. (2008)
‘Peer violence and electronic media – Research and social campaign’
Key findings
Ways of working with a broad set of third parties to consider new and
innovative means of cyber-crime including outsourcing and various public-private partnerships.
Method
The research used questionnaires and interviews to collect data from government institutions.
Hypothesis
Alignment of key government institutions was a sure way of ensuring cyber-crime free environment in the Kingdom of Saudi Arabia
Variables
Alignment of key government institutions
Future research
As the research is tailored, there is a need for multi-channel access and cyber-crime prevention options.
United Kingdom (UK)
Notes
This research was mainly built on the theoretical model of management that were formed on the basis of the quality of management
Batson, C. D. (2006).
‘The altruism question: Toward a social-psychological answer ’
Key findings
The study mainly focused on new channels of online communication social media for proactive two-way communication
The study adopted primary data collection where an online survey was the key source of information
Hypothesis
Relationship between channels of online communication and proactive two-way communication
Variables
Internets users and level of cyber-crime prevention
Future research
Government administrative and support processes are often fragmented across multiple agencies, therefore, future research needs to consider this aspect
United Kingdom (UK)
Notes
Different aspects of internet domain consortium were analyzed using secondary sources of data
Batson, et al. (2009)
‘Empathy and attitudes: Can feeling for a member of a
stigmatized group improve feelings toward the group’
Key findings
-Finding effectiveness of the just-introduced platforms such as shared services for IT colocation, e-hosting, infrastructure and
hardware and software by the
UAE Telecommunications Regulator Authority
Method
The research was comparative research adopted by interviews and online surveys.
Theory
This study’s theoretical underpinning was the effectiveness of the Ministry of Commerce E- in dealing with cyber-crime.
Variables
Effectiveness of measuring cyber-crime within the ministries in Saudi Arabia and the UK.
Future research
While a chargeback model is not currently in place, it has undertaken a benchmarking study to identify best practices.
United Arab Emirates (UAE)
Notes
The theoretical model adopted in this paper focused on the quality of service delivery and customer satisfaction
Brem (2001)
‘Some ethical considerations and resource for analyzing online discussion’
Key findings
It analyzed and brought recommendations regarding ethical issues to be considered when doing online research.
Method
Interviewing, data collection and analysis using Statistical Programme for Social Science (SPSS).
Theories
Does online research and discussion require ethical considerations when trying to avoid cases of infringement and cybercrime activities
Variables
Online discussion and Ethical considerations
Limitation
-The study only focused on strategic priorities for information technology programs and ignoring the fact that by strengthening the professionalism and skillsets of public servants, the government is able to improve the instances of cyber-crime
United States of America (USA)
Notes
The best approach that was given by the researcher was the adoption of Strategic Priorities for Information Technology Program’ which actually factored in different elements of service deliveries in public and private sectors
Casey (2002)
‘Error, Uncertainty and Loss in Digital Evidence’
Key findings
Each layer on a network normally provides an opportunity for new errors. In order to reduce incorrect conclusions based on unreliable data then it is essential for quantification of uncertainty.
Methods
It was a review of findings and other literature using logs to describe potential evidence from the uncertainty in data. The data was collected from secondary sources.
Hypothesis
The main attribute of this paper was to explore the inherent uncertainty in evidence collected from computer
Variables
Scientific method by detecting, quantifying, and compensating for errors and loss in evidence collected from networked systems.
Limitation
Recent efficiency advisory experience suggests a number of inherent poor strategies in dealing with cyber-crime. Based on this, this research failed to integrate the software breakthrough for business-to-business commerce with common mistakes done by managers
United Kingdom (UK)
Service theory and employee motivation were used in this case.
Chalmers J. B., and Townsend, R. (2009)
‘The effect of training in social perspective-taking on socially maladjusted girls’
Key findings
-Suggested readiness of government agencies by highlighting lapses in building modern infrastructure and provision of shared applications and upgrading the competitiveness of the UAE in the field of e-Government
Methods
The research formulated a quantitative research survey by developing questions to be presented to 35 high ranking institutions in the United Arab Emirates
Hypothesis
The was a possibility of ministries, public and private sectors to attain five dimensions of service excellence could if readiness of these institutions are measured
Variables
Service excellence and five dimensions of service excellence
Limitation
The research succinctly covers factors such as the infrastructure and regulatory policies that affect the growth of the ICT sector in the UAE but fail to integrate it with outputs of the mentioned sectors in the government
United Kingdom (UK)
Notes
A qualitative survey was done on the 35 different organizations including public and private ones.
Choi (2006)
‘An empirical assessment of an integrated theory of cyber-crime victimization’
Key findings
In general, the findings from this study provide an overall picture of the relationship between computer security, online lifestyle, and individual computer-crime.
Scope
The survey was designed to collect data from a 10-month period where students were asked to recall incidences of cybercrime in the school.
Hypothesis
The main theories included routine activities theory and lifestyle-exposure theory
Variables
The dependent variables are Online Lifestyle and Digital Guardian versus independent variable Crime Victim
Future research The structure of the research questionnaires focused on personal computers or laptops and the suggestion of minimizing cybercrime.
United States of America (USA)
Notes
-The models tested were many hence gave the research a more accurate outcome
Clore, G. L., & Jeffrey, K. M. (2008)
‘Emotional role-playing, attitude change, and attraction
toward a disabled person’
Key findings
-The study analyses key components of eGovernment strategies in developing countries with the case study of Saudi Arabia.
-In so doing the research reviews components of the strategy, which include the strategies to eliminate cyber-crime.
Methods
Regression and factor analysis using SPSS
Hypothesis
Strategic objectives and strategic dimensions were found to be very important for cyber victimization control in developing countries
Variables
Cyber victimization control in developing countries
Limitation
The study failed to consider strategic enablers--- key factors that enable cyber victimization control
United Kingdom (UK)
Notes
The research also provided for a detailed explanation of the several aspects of the current situation of cyber victimization
Computer Security Institute (2012)
‘Computer Crime and Security Survey’
‘
Key findings
Measures the ability of federal government agencies in the UAE in terms of technology, organization, and human resources to use ICT outputs and their ability to transform towards computer crime and security survey
Methods
The research mainly adopted secondary data in the gathering data
Hypothesis
The advancement of the UAE e-commerce depended on frameworks like environment, readiness, and usage
Variables
Market theory and concerned parties
Future research
Future research should make attempts to cover factors like regulatory policies and infrastructure affecting the growth of the ICT sector in the UAE.
United Arab Emirates (UAE)
Notes
Service theory and employee motivation were used in this case.
Eisenberg, N. (2012)
‘Emotion, regulation and moral development’
Key findings
The study presents ways to promote regulation and moral development in the private sector and to make the experience of “Saudi Arabia” a pleasurable one
Method
The research mainly adopted the primary source of data where interviews were used
Hypotheses
Architecture and Applications of Information Technology in Saudi Arabia
Variables
Regulation and moral development in Saudi Arabia
Future research
There is a need for research that will connect with this in terms of developing employees’ abilities and emphasize their role in the future of the UAE cyber-crime related activities
United Kingdom (UK)
Notes
It was comparative research that used interviews on workers in non-governmental and governmental organizations.
Fienberg S, and Kadane (2009)
‘The presentation of Bayesian Statistical Analyses in Legal Proceedings’
Key findings
The Bayesian methods of statistics by Pearson took a center stage in government statistics presentation by 1950’s replacing the old method of descriptive
Scope
The study uses literature review methods whereby secondary data was used to discuss outcomes on the government statistical presentation
Qualitative data was collected to support SERVQUAL data
Hypothesis
The theories here included the confidentiality and risk Utility trade-off
There is a possibility of measuring levels of service delivery by adopting SPPS instruments
Variables
-The variables here are neo-Bayesian methods versus Bayesian methods of statistical presentation of data in government set up
-Service excellence and five dimensions of service excellence instrument
Limitations
There is a shortage of credible research data in the field of quality and excellence in the region.
United Kingdom (UK)
Notes
Survey method was appropriate and used in collecting data for determining the customer perception on service quality
Flewitt R. (2012)
‘Conducting research with young children’
Key findings
Crucial steps of service quality and how it relates to customer’s satisfaction was clearly outlined by the study
Method
The research mainly adopted secondary data in the gathering data
Hypothesis
Digital cops in a networked environment concept
Variables
Service quality and customer’s satisfaction
Future research
Since organizations still find it hard to access industry-specific data/ benchmarks to compare their performance and share best practices, future studies should show how business environments need to open up to share good practices within peer industries.
United Kingdom (UK)
The data as analyzed may not be able to provide the needed results since the authors in the journals cited some limitations too.
Flewitt (2005)
‘Cyber-crime mitigations in Saudi Arabia and Perspectives’
Key findings
Different age categories of the adoption of innovation and tendency to victimize online users
Method
The research mainly adopted the primary source of data where interviews were used.
Hypothesis
There is a need to assess the age likely to participate in e-commerce thus subsequently addressing the issue to excellent service delivery
Variables
Age categories of the adoption of innovation
Limitation
In an attempt to assess age factor the research did not do hierarchical separation between women and men embedded in both social institution and social practices
United Kingdom (UK)
A qualitative survey was done on the 20 organizations with such organizations picked randomly from all the emirates.
Hawke, J. L. et al, (2013)
‘Genetic influences on crime difficulties in boys’ and girls’
Key findings
-Crime and psychology are related activities
-This research finds that
the full potential of electronic government services is unlikely to be realized without substantial citizen adoption of such services and their participation in such initiatives.
Method
Regression and factor analysis using SPSS
Theories
Gardner ‘s Multiple Intelligence theory and spearman two-factor theory
Variables
Crime and digital content
Limitations
To concentrated and evaluate the psychological impact on crime and relate it with technology
United Kingdom (UK)
This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.
Heath N, (2009)
‘Europe to get a cybercrime alert system’
Key findings
This research establishes mechanisms that developed countries should use to enhance security from cybercrime activities
Methods
Literature review and evaluating data. Also using court cases as a guiding factor
Hypothesis
The theories incorporated in this case include the review of Space Transition, the confidentiality and risk Utility trade-off
Variables
Control of cybercrime activities as the dependent variable and getting the cybercrime alert system as the independent variable
Limitation
The research fails to establish how the suggested strategies will incorporate the already existing strategies created
United Kingdom (UK)
-The descriptive research method used was the most appropriate
Inman K, and Rudin N (2009)
‘Principles and practices of criminalistics: the profession of forensic science.’
Key findings
Understand the discrepancies among Forensic Community, Discipline/Field, and Agencies
Methods
Empirical study and Review of kinds of literature that compare government strategies that help fight cybercrimes in the United Kingdom and the United Arabs Emirates
Hypothesis
Ethical Standard in Forensic Science, Ethical Standard in Criminal Justice
Variables
Service quality and customer’s satisfaction
Limitation
-Though the research draws on the framework proposed to provide analysis and raise further
research questions on the developmental impacts of benchmarking e-government
initiatives.
methodologies and their impact on e-government development
United States of America (USA)
This paper explores the
methodologies followed by ten widely cited e-government benchmarking reports
Ipsos MORI (2013)
‘A survey of public attitudes to internet security’
Key findings
-The methodology of developing the strategy and its various components, as well as the working process adopted by the strategy development team
Methods
Application of EFQM excellence model. This is done through self-assessment within Federal governments.
Hypothesis
EFQM approach to the implementation effectiveness varied across levels in an organization
Variables
-Business research and methodology used
-Alignment of key government institutions
Limitation
Though the report utilized seven existing benchmarking criteria for the 11 countries studied
Canada
Excellence implementation and employee perceptions were analyzed using a case study approach
James M, (2008). ‘The Computer Fraud and Abuse Act: A Powerful Weapon vs. Unfair
Competitors and Disgruntled Employees’
Key findings
A possible solution to cybercrime prevention for both private and public users
Methods
Literature review and essays analysis
Hypothesis
- Digital cops in a networked environment concept
-The size of the Federal public sector in UAE has been reduced significantly by privatization policy
-Level of Economic development and e-commerce in Saudi Arabia
Variables
-Trends in telecommunications identity and information technology in the Kingdom of Saudi Arabia databases
- Cybercrimes and cops
Limitations
-Despite that the research
the methodology was based on a combination of qualitative and quantitative measures, the final approach tended to be quantitative.
- Further areas of study should include ways of integrating technology and environment
United Kingdom (UK)
-The descriptive research method used was the most appropriate
-Qualitative and analytical methods
Data collection was from economic data and files
Economic theory was the basis of the study
Journal of Crime, Criminal Law and Criminal Justice Koninklijke, Brill NV (2013)
‘Criminal Law and Criminal Justice Koninklijke’
The findings indicate that cybercrime cases are more likely to be prosecuted and sanctions are imposed in economies that are characterized by a higher degree of cooperation and integration with the West
Methods
-Primary data used was collected through the use of three separate questionnaires tailored to fit the desired outcome.
-Descriptive analysis approach
Hypothesis
The theoretical contribution is the observation that emerging economies international cooperation and integration would help them enhance system capacity and law enforcement performance to deal with cybercrime
Variables
Level of Economic Development and Cybercrime
Limitations
-The issue of political and social inclusiveness of benchmarking is a
challenge interrelated with the design of e-government benchmarking
methodologies but was not considered in the analysis
United Kingdom (UK)
Primary and secondary data was majorly used. Various models e.g. Simons’ control model formed the major sources of study.
Kotadia (2004)
‘Skills not money needed to fight cybercrime’
Managed to describe the different types of cyber Attack in different Countries and it can be used to prevent the increasing cybercrimes
Descriptive analysis approach
What are some of ways and tactics which different countries are using to prevent and control cyber crimes
Prevention measures and degree of effectiveness
To investigate to details how different countries are fighting cyber crimes
China
This paper explores the
methodologies followed by ten widely cited e-government benchmarking reports
Kouri (2004)
Cybercrime fighters
Finds strategies different Federations have used to fight cybercrime
Application of EFQM excellence model. This is done through self-assessment within Federal governments.
What are the strategies that the federal government have taken to reduce cases of cybercrime in government institutions
Fighting cybercrime within government institutions as the dependent variable and economic development as the independent variable
This research focusses on only one country thus the conclusion given does not reflect cybercrime activities in other countries
United States of America
Leyden (2010)
‘Enforcement is key to fighting cybercrime’
He found that the significant difference between physical-space and cyberspace is that, unlike a physical location, cyberspace is not limited to distance, proximity, and physical separation
Cross-examination and analysis of facts
What are Feds fighting cybercrime techniques
Cyberspace, physical location, and physical space
Lack of theory to back up findings
United Kingdom
The data obtained may not be able to provide the needed results owing to the limited respondents used
Lopez and Rodriguez (2012)
‘The Spanish Model. New Left Review’
Spain model of Cybercrime prevention
Survey research was used to determine the assessment of the citizens on the government. Data were collected using questionnaires
What is the Spain model of cybercrime prevention
Cybercrime, technology and prevention techniques review
Unreliable respondent as the major challenge
Spain
This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.
Magnin (2001)
Council of Europe Convention on cyber-crime
The research discussed and proposes means and ways through which cybercrimes can be prevented by different countries
The researcher uses descriptive and empirical review analysis
What are cybercrimes and its origin
Cybercrime, technology, and prevention
Secondary data used are majorly people opinions which lack scientific backups
United Arabs Emirates
The models tested were many hence gave the research a more accurate outcome
Markovits and Westermann (2012)
‘United Kingdom Strategy and Cybercrime’
Forensic Community, Discipline/Field, and Agencies
Regression and factor analysis Using SPSS
Forensic Science, Ethical Standard in the United Kingdom
United Kingdom Strategy and Cybercrime: Hegemonic Power and Economic Gain
Further areas of study should include ways of integrating technology and environment
United Kingdom
The data obtained may not be able to provide the needed results
Mills (2008)
‘Cybercrime in an economic downturn’
Gives deep insights of understanding cyber-crimes especially when countries face an economic downturn
The researcher uses descriptive and empirical review analysis
What are the challenges of fighting the cybercrimes and issues involved in an economically difficult environment
Phenomenal, challenges and legal response
Computer logs and data literature analysis not included in the study
United Arabs Emirates
This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.
Newman and Clarke (2010)
Superhighway Robbery: Preventing E-Commerce Crime
The argument here is that situational crime prevention works and is ideally suited to proving the means of developing measures to combat rapidly growing e-commerce crimes
Uses the concepts of crime prevention strategy and analysis
Understanding of Superhighway Robbery and challenges to the prevention of E-Commerce Crime
It identified as intellectual property, intelligence, information systems and services of various kinds (banking, purchasing among others)
The statement of the problem was not all-inclusive as the book concentrated majorly on the E-commerce assuming other sectors
United Kingdom
The data obtained may not be able to provide the needed results
Patnaik (2004)
The vulnerability of children through cybercrimes
This research has focused on two issues. Firstly, it establishes the vulnerability of children through cybercrimes. Secondly, it links the findings with the American Society of Criminology
Empirical study and Review
What are the effects of school children as a result of cybercrime activities? Does the American Society of Criminology have conforming strategies to fight the crime?
The vulnerability of children as the dependent variable and Strategies used by the American Society of Criminology as the independent variable
This research has failed to establish theories related to the development of children and as a result, it is difficult to relate cybercrime activities as an effect of the development of children
United States of America
The models tested were many hence gave the research a more accurate outcome
Populi (2009)
‘Threat of cybercrime continues to increase’
That forensic science should go beyond the law and should include major factors in crime prevention and establishment of regulations
Interviewing, data collection and analysis using Statistical Programme for Social Science (SPSS)
What is the role of forensic study and science in crime prevention
Come up with implementation strategy and the role of forensic science
The areas of further study includes the procedure of rules implementation and procedures
United Kingdom
This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.
Ryan and Shpantzer (2005)
Legal Aspects of Digital Forensics
Interpretation of digital research ethics and legal issues surroundings it
Reviewing of related literature and comparative analyses of the data from government websites
Ethical theories and research issues
Representative, transformative technologies, Primary mode of digital information, Examples of potential issues implicate
Establishment of research form methodology approach on ethical issues on digital research
United States of America
The models tested were many hence gave the research a more accurate outcome
Rosenmann and Safi (2013)
‘Pushed Factors of Internet Crime’
The finding is that it is difficult to identify what works and what does not work in general, or what is even counter-productive
A conceptual Discussion and Literature Review
The concept of Radicalization
Radicalization, De-radicalization, Counter-radicalization
It has also prevented analysis of phenomena on the macro-level of how CT and other policies of Western democracies are perceived in the Arab and Muslim world
Netherlands
The data obtained may not be able to provide the needed results
Sales and Folkman (2010)
‘Ethics in research with human participants’
The findings were that Digital curriculum to be introduced in the study for ethical and professional purposes
An empirical analysis of ethical consideration of digital research
Ethical considerations and issues on digital content and ICT used in the public and private sector
Ethical issues versus legal issues and professionalism
To come up and establish a uniform set of professional norms for the responsible conduct of Internet-based research
United States of America
The data obtained may not be able to provide the needed results
Soumyo (2012)
‘Developing Policies for Cybercrime’
The research has laid out suggestions on how to develop Policies for Cybercrime
Empirical Issues analyzed within the realm of European ethical consideration
Challenges of fighting the cybercrimes and issues involved in an economic difficult environment
The dependent variable as established by the research is Developing Policies for Cybercrime while independent variable being Empirical Issues with cybercrimes
The research has not established contributions made as far as the review of other literature materials is concerned. This further raises the question of the theoretical framework adopted
United Arabs Emirates
This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.
Tapscott (2008)
‘The Rise of the Net Generation’
This research has established concerns in the growing up of digital and how that help speed up cases of cybercrime activities especially in the wake of the rise of the Net Generation
Empirical Issues analyzed within the realm of European ethical consideration
What are cybercrimes and its origin
The dependent variable as established by the research is growing up of digital independent variable being cases of cybercrime activities especially in the wake of the rise of the Net Generation
Further areas of study should include ways of integrating technology and environment
United States of America
The models tested were many hence gave the research a more accurate outcome
United Nations Resolution (2005)
‘In determining the strength of new legislation’
The resolution of the meeting was the harmonization of rules and regulation concerning cybercrime prevention
Discussion and presentation method of situational analysis
What is an efficient tool to fight cybercrime?
Cybercrime and law of fighting it
The discussion majorly consist of expert opinions but lacked both practical and empirical evidence of cybercrime
Australia
The data obtained may not be able to provide the needed results
Wall (2013)
‘Digital realism and the governance of spam as cybercrime’
Technology alone has failed to cub cyber crime hence other methodology should be employed to cub it
The study uses empirical literature review
The research question is should law and cyber-crime prevention policy be embedded within the code that structures the architecture of communications?
Law, technology, and level of cybercrime control. Law and spam distribution
To come up with ways through which law and technology can be integrated to avoid cybercrime
United Kingdom
The research also provided for a detailed explanation of the several aspects of the current situation of cyber victimization
Wilkins (2009)
‘Long-Distance Conversations by Computer’
The study revealed that social engineers use statements in positive and negative manners in combination with authoritative and urgent persuasions to influence innocent people on their decisions to respond
The sampling research method was used whereby 200 phishing and advance-fee e-mails were used
What are the persuasion techniques exploited by social engineers for their illegal gains
Triggers and the number of persuasions used
Areas of further research included how education can be used to eliminate online research
United Kingdom
The research also provided for a detailed explanation of the several aspects of the current situation of cyber victimization
Willard, N. E. (2006)
‘Cyber-bullying and cyber threats’
Key findings
-It also found that there are fragmented delivery models that exist in Saudis public and private that are actually causing redundancy across departments
Methods
The researcher adopted online interviews that were sent to 56 different organizations
Hypothesis
-Less coordinated administration in public and private organizations may lead to the dissatisfaction of the customer
Variables
Effectiveness of the software breakthrough for business-to-business commerce
Limitation
The study population was limited to smaller region within one of the emirates hence risky
United Kingdom (UK)
The models tested were many hence gave the research a more accurate outcome
Williams, K. R., & Guerra, N. G. (2007)
Prevalence and predictors of internet bullying
Key findings
It analyzed and brought recommendations regarding ethical issues to be considered when doing online shopping and e-commerce
Scope
The scope of the study encompassed 12 ways of enhancing strategic performance in the public and private sectors vis-à-vis private.
Theories
The main theories were lifestyle-exposure theory
Variables
Strategic priorities for information technology programs as a benchmark on quality
Limitation
The study population was limited to smaller region within one of the emirates hence risky
United Arab Emirates (UAE)
The data obtained may not be able to provide the needed results
Wolak, J., Mitchell, K. J., & Finkelhor, D. (2006)
‘Online Victimization: 5 Years Later’
Key findings
Taking a wide approach to service delivery by building a new cross-department organization with accountability and governance for service delivery.
Method
The research adopted the model of testing and verifying a significant number of hypotheses and models as part of the methodology in the study.
Hypothesis
The first hypothesis was; ways to take more of an enterprise-wide approach to service delivery
Variables
Total expenditure in terms of millions by UAE and the outcome of strategies the spent millions leverage on.
Limitation
The study population was limited to smaller regions within one of the emirates hence risky.
United Arab Emirates (UAE)
The data obtained may not be able to provide the needed results
Ybarra, M. L., & Mitchell, K. J. (2004)
‘Online aggressor/targets, aggressors, and targets’
Key findings
Establishes the computer usage approach by establishing service standards for interactions with all different categories of customers
Method
The was the application of primary that was gathered through interviews and questionnaire
Hypothesis
Telecommunications and Information Technology in the Kingdom of Saudi Arabia databases
Variables
Future of Telecommunications Identity and Information Technology in the Kingdom of Saudi Arabia databases
Future research
While the scope of the study seemed feasible, there is a need to evaluate the feasibility of a one-stop-shop approach with other departments where there is a common customer base.
United Arab Emirates (UAE)
This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.
...Download file to see next pages Read MoreHeath N, (2009) ‘Europe to get cybercrime alert system’ Key findings This research establishes mechanisms that developed countries should use to enhance security from cybercrime activities Methods Literature review and evaluating data. Also using court cases as a guiding factor Hypothesis The theories incorporated in this case include the review of Space Transition, the confidentiality and risk Utility trade off Variables Control of cybercrime activities as the dependent variable and getting cybercrime alert system as the independent variable Limitation The research fails to establish how the suggested strategies will incorporate the already existing strategies created United Kingdom (UK) -Descriptive Research method used was the most appropriate Inman K, and Rudin N (2009) ‘Principles and practices of criminalistics: the profession of forensic science.
’ Key findings Understand the discrepancies among Forensic Community, Discipline/Field, and Agencies Methods Empirical study and Review of literatures that compare government strategies that help fight cybercrimes in United Kingdom and United Arabs Emirates Hypothesis Ethical Standard in Forensic Science, Ethical Standard in Criminal Justice Variables Service quality and customer’s satisfaction Limitation -Though the research draws on the framework proposed to provide analysis and raise further research questions on the developmental impacts of benchmarking e-government initiatives.
methodologies and their impact on e-government development United States of America (USA) This paper explores the methodologies followed by ten widely cited e-government benchmarking reports Ipsos MORI (2013) ‘A survey of public attitudes to internet security’ Key findings -The methodology of developing the strategy and its various components, as well as the working process adopted by the strategy development team Methods Application of EFQM excellence model. This is done through self-assessment within Federal governments.
Hypothesis EFQM approach to the implementation effectiveness varied across levels in an organization Variables -Business research and methodology used -Alignment of key government institutions Limitation Though the report utilized seven existing benchmarking criteria for the 11 countries studied Canada Excellence implementation and employee perceptions was analyzed using case study approach James M, (2008). ‘The Computer Fraud and Abuse Act: A Powerful Weapon vs. Unfair Competitors and Disgruntled Employees’ Key findings Possible solution on cybercrime prevention for both private and public users Methods Literature review and essays analysis Hypothesis - Digital cops in a networked environment concept -The size of Federal public sector in UAE has been reduced significantly by privatization policy -Level of Economic development and e-commerce in Saudi Arabia Variables -Trends in telecommunications identity and information technology in Kingdom of Saudi Arabia databases - Cybercrimes and cops Limitations -Despite that the research methodology was based on a combination of qualitative and quantitative measures, the final approach tended to be quantitative.
- Further areas of study should include ways of integrating technology and environment United Kingdom (UK) -Descriptive Research method used was the most appropriate -Qualitative and analytical methods Data collection was from economic data and files Economic theory was the basis of the study Journal of Crime, Criminal Law and Criminal Justice Koninklijke, Brill NV (2013) ‘Criminal Law and Criminal Justice Koninklijke’ The findings indicate that cybercrime cases are more likely to be prosecuted and sanctions are imposed in economies that are characterized by a higher degree of cooperation and integration with the West Methods -Primary data used was collected through the use of three separate questionnaires tailored to fit the desired outcome.
-Descriptive analysis approach Hypothesis Theoretical contribution is the observation that emerging economies international cooperation and integration would help them enhance system capacity and law enforcement performance to deal with cybercrime Variables Level of Economic development and Cyber crime Limitations -The issue of political and social inclusiveness of benchmarking is a challenge interrelated with design of e-government benchmarking methodologies but was not considered in the analysis United Kingdom (UK) Primary and secondary data was majorly used.
...Download file to see next pages Read More