{"id":"https://openalex.org/W4293919573","doi":"https://doi.org/10.1007/s10796-022-10326-w","title":"The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies","display_name":"The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies","publication_year":2022,"publication_date":"2022-09-01","ids":{"openalex":"https://openalex.org/W4293919573","doi":"https://doi.org/10.1007/s10796-022-10326-w"},"language":"en","primary_location":{"id":"doi:10.1007/s10796-022-10326-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10796-022-10326-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10796-022-10326-w.pdf","source":{"id":"https://openalex.org/S181659395","display_name":"Information Systems Frontiers","issn_l":"1387-3326","issn":["1387-3326","1572-9419"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Systems Frontiers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10796-022-10326-w.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002419741","display_name":"Romanus Izuchukwu Okeke","orcid":"https://orcid.org/0000-0002-8733-7401"},"institutions":[{"id":"https://openalex.org/I8408910","display_name":"Cardiff Metropolitan University","ror":"https://ror.org/00bqvf857","country_code":"GB","type":"education","lineage":["https://openalex.org/I8408910"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Romanus Izuchukwu Okeke","raw_affiliation_strings":["Cardiff School of Management, Cardiff Metropolitan University, Western Avenue, Cardiff, CF5 2YB, UK","Cardiff School of Management, Cardiff Metropolitan University, Cardiff, UK"],"affiliations":[{"raw_affiliation_string":"Cardiff School of Management, Cardiff Metropolitan University, Western Avenue, Cardiff, CF5 2YB, UK","institution_ids":["https://openalex.org/I8408910"]},{"raw_affiliation_string":"Cardiff School of Management, Cardiff Metropolitan University, Cardiff, UK","institution_ids":["https://openalex.org/I8408910"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032823748","display_name":"Mahmoud Hashem Eiza","orcid":"https://orcid.org/0000-0001-9114-8577"},"institutions":[{"id":"https://openalex.org/I63098007","display_name":"Liverpool John Moores University","ror":"https://ror.org/04zfme737","country_code":"GB","type":"education","lineage":["https://openalex.org/I63098007"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Max Hashem Eiza","raw_affiliation_strings":["School of Computer Science and Mathematics, Faculty of Engineering and Technology, Liverpool John Moores University, Byrom Street, Liverpool, L3 3AF, UK","School of Computer Science and Mathematics, Faculty of Engineering and Technology, Liverpool John Moores University, Liverpool, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Mathematics, Faculty of Engineering and Technology, Liverpool John Moores University, Byrom Street, Liverpool, L3 3AF, UK","institution_ids":["https://openalex.org/I63098007"]},{"raw_affiliation_string":"School of Computer Science and Mathematics, Faculty of Engineering and Technology, Liverpool John Moores University, Liverpool, UK","institution_ids":["https://openalex.org/I63098007"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5002419741"],"corresponding_institution_ids":["https://openalex.org/I8408910"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":1.5942,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.87064728,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/clarity","display_name":"CLARITY","score":0.8223580718040466},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.6979616284370422},{"id":"https://openalex.org/keywords/thematic-analysis","display_name":"Thematic analysis","score":0.6475355625152588},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6001812219619751},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4642900228500366},{"id":"https://openalex.org/keywords/vagueness","display_name":"Vagueness","score":0.46074238419532776},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.43105530738830566},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.423639178276062},{"id":"https://openalex.org/keywords/unison","display_name":"Unison","score":0.4206514358520508},{"id":"https://openalex.org/keywords/qualitative-property","display_name":"Qualitative property","score":0.41541337966918945},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.414610892534256},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.22760292887687683},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2247627079486847},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.17817404866218567},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.11102759838104248}],"concepts":[{"id":"https://openalex.org/C2777146004","wikidata":"https://www.wikidata.org/wiki/Q14949826","display_name":"CLARITY","level":2,"score":0.8223580718040466},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.6979616284370422},{"id":"https://openalex.org/C74196892","wikidata":"https://www.wikidata.org/wiki/Q7781188","display_name":"Thematic analysis","level":3,"score":0.6475355625152588},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6001812219619751},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4642900228500366},{"id":"https://openalex.org/C2776825360","wikidata":"https://www.wikidata.org/wiki/Q1411921","display_name":"Vagueness","level":3,"score":0.46074238419532776},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.43105530738830566},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.423639178276062},{"id":"https://openalex.org/C2780304638","wikidata":"https://www.wikidata.org/wiki/Q176224","display_name":"Unison","level":2,"score":0.4206514358520508},{"id":"https://openalex.org/C87156501","wikidata":"https://www.wikidata.org/wiki/Q7268708","display_name":"Qualitative property","level":2,"score":0.41541337966918945},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.414610892534256},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.22760292887687683},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2247627079486847},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.17817404866218567},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.11102759838104248},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s10796-022-10326-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10796-022-10326-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10796-022-10326-w.pdf","source":{"id":"https://openalex.org/S181659395","display_name":"Information Systems Frontiers","issn_l":"1387-3326","issn":["1387-3326","1572-9419"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Systems Frontiers","raw_type":"journal-article"},{"id":"pmh:oai:researchonline.ljmu.ac.uk:17432","is_oa":false,"landing_page_url":"https://orcid.org/0000-0001-9114-8577","pdf_url":null,"source":{"id":"https://openalex.org/S4306401246","display_name":"Liverpool John Moores University","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63098007","host_organization_name":"Liverpool John Moores University","host_organization_lineage":["https://openalex.org/I63098007"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:RePEc:spr:infosf:v:25:y:2023:i:2:d:10.1007_s10796-022-10326-w","is_oa":false,"landing_page_url":"http://link.springer.com/10.1007/s10796-022-10326-w","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:figshare.com:article/21253449","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/The_Application_of_Role_Based_Framework_in_Preventing_Internal_Identity_Theft_Related_Crimes_A_Qualitative_Case_Study_of_UK_Retail_Companies/21253449","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1007/s10796-022-10326-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10796-022-10326-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10796-022-10326-w.pdf","source":{"id":"https://openalex.org/S181659395","display_name":"Information Systems Frontiers","issn_l":"1387-3326","issn":["1387-3326","1572-9419"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Systems Frontiers","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4293919573.pdf","grobid_xml":"https://content.openalex.org/works/W4293919573.grobid-xml"},"referenced_works_count":56,"referenced_works":["https://openalex.org/W110185960","https://openalex.org/W1527311855","https://openalex.org/W1990489265","https://openalex.org/W2016874080","https://openalex.org/W2022077643","https://openalex.org/W2033552550","https://openalex.org/W2049428776","https://openalex.org/W2055670490","https://openalex.org/W2057036604","https://openalex.org/W2106785762","https://openalex.org/W2117530168","https://openalex.org/W2121765158","https://openalex.org/W2137240809","https://openalex.org/W2140256961","https://openalex.org/W2151528985","https://openalex.org/W2164965146","https://openalex.org/W2185563184","https://openalex.org/W2192141942","https://openalex.org/W2292089056","https://openalex.org/W2339264655","https://openalex.org/W2476162126","https://openalex.org/W2613634132","https://openalex.org/W2726105884","https://openalex.org/W2780620674","https://openalex.org/W2795889984","https://openalex.org/W2938830984","https://openalex.org/W2982096248","https://openalex.org/W3022607203","https://openalex.org/W3110300282","https://openalex.org/W3111835944","https://openalex.org/W3133958860","https://openalex.org/W3136328719","https://openalex.org/W3164870595","https://openalex.org/W3165300127","https://openalex.org/W3200205898","https://openalex.org/W3209026923","https://openalex.org/W3210016119","https://openalex.org/W3214890603","https://openalex.org/W4200552195","https://openalex.org/W4205485507","https://openalex.org/W4205730453","https://openalex.org/W4210553254","https://openalex.org/W4221020382","https://openalex.org/W4229598339","https://openalex.org/W4231428952","https://openalex.org/W4241430965","https://openalex.org/W4244630465","https://openalex.org/W4248450049","https://openalex.org/W4294214983","https://openalex.org/W4388059096","https://openalex.org/W6631705094","https://openalex.org/W6680998773","https://openalex.org/W6774780595","https://openalex.org/W7005922941","https://openalex.org/W7043301269","https://openalex.org/W7071701761"],"related_works":["https://openalex.org/W2365473327","https://openalex.org/W2509924613","https://openalex.org/W2096680212","https://openalex.org/W1537404137","https://openalex.org/W2517885960","https://openalex.org/W2391746841","https://openalex.org/W1521091682","https://openalex.org/W1996232793","https://openalex.org/W2516349397","https://openalex.org/W2510996596"],"abstract_inverted_index":{"Abstract":[0],"This":[1],"paper":[2],"aims":[3],"to":[4,111,137,140],"examine":[5],"the":[6,17,36,86,113],"challenges":[7,88,114],"of":[8,27,31,74,78,89,100,115,121],"preventing":[9,90,116],"internal":[10,142],"identity":[11],"theft":[12],"related":[13],"crimes":[14,129],"(IIDTRC)":[15],"in":[16,35,80,92,133,150],"UK":[18,37,93],"retail":[19,38,94],"sector.":[20],"Using":[21],"an":[22,98],"in-depth":[23],"multiple":[24],"case":[25],"studies":[26],"a":[28,49,104],"selected":[29],"number":[30],"cross-functional":[32,108],"management":[33,40,109],"teams":[34,131],"companies,":[39],"roles":[41,75,123],"were":[42],"analysed.":[43],"We":[44,96],"used":[45,55],"semi-structured":[46],"interview":[47],"as":[48],"qualitative":[50],"data":[51,82,143],"collection":[52],"technique":[53],"and":[54,60,76,128],"Nvivo":[56],"aided":[57],"thematic":[58],"analysis":[59,106],"interpretivism":[61],"underpinned":[62],"by":[63],"Role-Based":[64],"Framework":[65],"(RBF)":[66],"for":[67,107,146],"analysis.":[68],"Our":[69],"findings":[70],"revealed":[71],"that":[72],"vagueness":[73],"lack":[77],"clarity":[79,120],"sharing":[81],"security":[83,127],"responsibilities":[84],"are":[85,148],"major":[87],"IIDTRC":[91,139],"companies.":[95],"suggest":[97],"application":[99],"RBF":[101,118],"which":[102],"provides":[103],"conceptual":[105],"team":[110],"address":[112],"IIDTRC.":[117],"enables":[119],"shared":[122],"where":[124],"both":[125],"information":[126],"prevention":[130],"work":[132],"unison":[134],"is":[135],"required":[136],"prevent":[138],"maximise":[141],"security.":[144],"Contributions":[145],"policymakers":[147],"offered":[149],"this":[151],"paper.":[152]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
