ECOMMERCE FRAUD INCIDENT RESPONSE: A GROUNDED THEORY STUDY

被引:2
作者
Dwight J. [1 ]
机构
[1] School of Science, Engineering, and Technology, Royal Melbourne Institute of Technology, Hanoi
关键词
cyber incident response; ecommerce fraud; fraud prevention; grounded theory;
D O I
10.28945/5110
中图分类号
学科分类号
摘要
Aim/Purpose This research study aimed to explore ecommerce fraud practitioners’ experiences and develop a grounded theory framework to help define an ecommerce fraud incident response process, roles and responsibilities, systems, stakeholders, and types of incidents. Background With a surge in global ecommerce, online transactions have become increasingly fraudulent, complex, and borderless. There are undefined ecommerce fraud roles, responsibilities, processes, and systems that limit and hinder cyber incident response to fraudulent activities. Methodology A constructivist grounded theory approach was used to investigate and develop a theoretical foundation of ecommerce fraud incident response based on fraud practitioners’ experiences and job descriptions. The study sample consisted of 8 interviews with ecommerce fraud experts. Contribution This research contributes to the body of knowledge by helping define a novel framework that outlines an ecommerce fraud incident response process, roles and responsibilities, systems, stakeholders, and incident types. Findings An ecommerce fraud incident response framework was developed from fraud experts’ perspectives. The framework helps define processes, roles, responsibilities, systems, incidents, and stakeholders. The first finding defined the ecommerce fraud incident response process. The process includes planning, identification, analysis, response, and improvement. The second finding was that the fraud incident response model did not include the containment phase. The next finding was that common roles and responsibilities included fraud prevention analysis, tool development, reporting, leadership, and collaboration. The fourth finding described practitioners utilizing hybrid tools and systems for fraud prevention and detection. The fifth finding was the identification of internal and external stakeholders for communication, collaboration, and information sharing. The sixth finding is that research participants experienced different organizational alignments. The seventh key finding was stakeholders do not have a holistic view of the data and information to make some connections about fraudulent behavior. The last finding was participants experienced complex fraud incidents. Recommendations for Practitioners It is recommended to adopt the ecommerce fraud response framework to help ecommerce fraud and security professionals develop an awareness of cyber fraud activities and/or help mitigate cyber fraud activities. Future Research Future research could entail conducting a quantitative analysis by surveying the industry on the different components such as processes, systems, and responsibilities of the ecommerce fraud incident response framework. Other areas to explore and evaluate are maturity models and organizational alignment, collaboration, information sharing, and stakeholders. Lastly, further research can be pursued on the nuances of ecommerce fraud incidents using frameworks such as attack graph generation, crime scripts, and attack trees to develop ecommerce fraud response playbooks, plans, and metrics. © 2023 Informing Science Institute. All rights reserved.
引用
收藏
页码:173 / 202
页数:29
相关论文
共 63 条
  • [1] Adamov A., Carlsson A., Cloud incident response model, Proceedings of the 2016 IEEE East-West Design & Test Symposium, pp. 1-3, (2016)
  • [2] Alammar F., Intezari A., Cardow A., . Pauleen J, Grounded theory in practice: Novice researchers’ choice between Straussian and Glaserian, Journal of Management Inquiry, 28, 2, pp. 228-245, (2019)
  • [3] Albakri A., Boiten E., De Lemos R., Risks of sharing cyber incident information, Proceedings of the 13th International Conference on Availability, Reliability, and Security, pp. 1-10, (2018)
  • [4] Al-Dhaqm A., Razak S. A., Siddique K., Ikuesan R. A., Kebande V. R., Towards the development of an integrated incident response model for database forensic investigation field, IEEE Access, 8, pp. 145018-145032, (2020)
  • [5] Ali M. A., Gross T., van Moorsel A., Investigation of 3-D secure’s model for fraud detection, Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust, pp. 1-11, (2018)
  • [6] Amasiatu C. V., Shah M. H., First party fraud management: Framework for the retail industry, International Journal of Retail & Distribution Management, 46, 4, pp. 350-363, (2018)
  • [7] Artikis A., Katzouris N., Correia I., Baber C., Morar N., Skarbovsky I., Fournier F., Paliouras G., A prototype for credit card fraud management: Industry paper, Proceedings of the 11th ACM International Conference on Distributed and Event-Based Systems, pp. 249-260, (2017)
  • [8] Bednar P. M., Katos V., Hennell C., On the complexity of collaborative cyber crime investigations, Digital Evidence and Electronic Signature Law Review, 6, (2014)
  • [9] Charmaz K., Constructing grounded theory: A practical guide through qualitative analysis, (2006)
  • [10] Charmaz K., Thornberg R., The pursuit of quality in grounded theory, Qualitative Research in Psychology, 18, 3, pp. 305-327, (2020)