Skip to main content

Research Repository

Advanced Search

All Outputs (25)

Cybercrime: Understanding the Current State of Literature and Issues Facing CISOs (2024)
Journal Article
Ferreira, C., Park, A., Kietzmann, J., Demetis, D., Flostrand, A., Mccarthy, I., Pitt, L., & Dabirian, A. (2024). Cybercrime: Understanding the Current State of Literature and Issues Facing CISOs. IT Professional, 26(2), 83-89. https://doi.org/10.1109/MITP.2024.3375571

The meteoric rise in cybercrime in recent years has resulted in renewed efforts to stem the potential negative effects of these nefarious activities. In this context, the role of the chief information security officer (CISO) has become one of strateg... Read More about Cybercrime: Understanding the Current State of Literature and Issues Facing CISOs.

Value Sinks: A Process Theory of Corruption Risk during Complex Organizing (2023)
Journal Article
Hazy, J. K., Lichtenstein, B., Demetis, D. S., Backström, T., & Dooley, K. J. (2023). Value Sinks: A Process Theory of Corruption Risk during Complex Organizing. Nonlinear Dynamics, Psychology, and Life Sciences, 27(3), 319-350

Theories and studies of corruption typically focus on individual ethics and agency problems in organizations. In this paper, we use concepts from complexity science to propose a process theory that describes how corruption risk emerges from condition... Read More about Value Sinks: A Process Theory of Corruption Risk during Complex Organizing.

Organised crime - the cyber dimension (2023)
Book Chapter
Demetis, D. (2023). Organised crime - the cyber dimension. In B. Rider (Ed.), A Research Agenda for Organised Crime (177-194). Cheltenham: Edward Elgar Publishing. https://doi.org/10.4337/9781802201369.00014

This chapter reviews a few critical technological developments and reflects both on their trajectory and on the opportunities they harbour for novel forms of cyber-enabled criminality. While the future of organised crime remains forever out of grasp,... Read More about Organised crime - the cyber dimension.

House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA) (2023)
Journal Article
Alshammari, M. M., & Demetis, D. S. (2023). House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA). Journal of Information Systems Security, 19(2), 133-161

Non-malicious insider threats continue to pose a significant concern to an organisation’s cybersecurity defence strategy, yet organisations still struggle to contain such insider threats. A critical pillar for doing so rests on the development and mo... Read More about House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA).

Interoperability: Our exciting and terrifying Web3 future (2022)
Journal Article
Park, A., Wilson, M., Robson, K., Demetis, D., & Kietzmann, J. (2022). Interoperability: Our exciting and terrifying Web3 future. Business Horizons, https://doi.org/10.1016/j.bushor.2022.10.005

This article introduces the next major generational evolution of the web: Web3. We review the fundamental evolution of the internet and the web over the past three decades, including a brief presentation of the publications in Business Horizons that... Read More about Interoperability: Our exciting and terrifying Web3 future.

Re-thinking de-risking: a systems theoretical approach (2021)
Journal Article
Tambe, N., & Demetis, D. (in press). Re-thinking de-risking: a systems theoretical approach. Journal of Money Laundering Control, https://doi.org/10.1108/JMLC-04-2021-0030

Purpose: This paper aims to explain the de-risking phenomenon through Luhmann’s risk/danger model and demonstrate that de-risking should be facilitated and encouraged. Design/methodology/approach: The paper applies Luhmann’s system theory and more sp... Read More about Re-thinking de-risking: a systems theoretical approach.

Online child sexual exploitation: a new MIS challenge (2021)
Journal Article
Demetis, D. S., & Kietzmann, J. (2021). Online child sexual exploitation: a new MIS challenge. Journal of the Association for Information Systems, 22(1), 5-40. https://doi.org/10.17705/1jais.00652

© 2021, Association for Information Systems. All rights reserved. This paper deals with the difficult yet increasingly important MIS phenomenon of online child sexual exploitation (online CSE). Through the use of secondary and publicly available data... Read More about Online child sexual exploitation: a new MIS challenge.

Breaking bad online: a synthesis of the darker sides of social networking sites (2019)
Journal Article
Demetis, D. S. (2020). Breaking bad online: a synthesis of the darker sides of social networking sites. European Management Journal, 38(1), 33-44. https://doi.org/10.1016/j.emj.2019.12.013

This essay deconstructs the ultra-dark side of social media and explores the variety of ‘bad’ behaviour online by looking at a wide spectrum of exploitative practices. Through the use of primary data from an online platform, we posit the question ‘Wh... Read More about Breaking bad online: a synthesis of the darker sides of social networking sites.

Economic Simulation of Cryptocurrencies and Their Control Mechanisms (2019)
Journal Article
Mainelli, M. R., Leitch, M., & Demetis, D. (2019). Economic Simulation of Cryptocurrencies and Their Control Mechanisms. Ledger, 4, 48-67. https://doi.org/10.5915/LEDGER.2019.130

A cryptocurrency needs a relatively stable value if it is to fulfill the traditional functions of money and be useful as a currency. To achieve this, controls are needed within the ecosystem of the cryptocurrency. Although a simulation cannot predict... Read More about Economic Simulation of Cryptocurrencies and Their Control Mechanisms.

Economic simulation of cryptocurrencies (2018)
Journal Article
Mainelli, M. R., Leitch, M., & Demetis, D. (2018). Economic simulation of cryptocurrencies. Capco Journal, 47, 89-101

Cryptocurrencies have the potential to become effective currencies that give a higher level of macroeconomic control, thanks to the information that is available about holdings and transactions, and the potential for automated control mechanisms. How... Read More about Economic simulation of cryptocurrencies.

Fighting money laundering with technology: a case study of Bank X in the UK (2017)
Journal Article
Demetis, D. S. (2018). Fighting money laundering with technology: a case study of Bank X in the UK. Decision Support Systems, 105, 96-107. https://doi.org/10.1016/j.dss.2017.11.005

This paper presents a longitudinal interpretive case study of a UK bank’s efforts to combat Money Laundering (ML) by expanding the scope of its profiling of ML behaviour. The concept of structural coupling, taken from systems theory, is used to refle... Read More about Fighting money laundering with technology: a case study of Bank X in the UK.

Taking the first step with systems theorizing in information systems : a response (2017)
Journal Article
Demetis, D. S., & Lee, A. S. (2017). Taking the first step with systems theorizing in information systems : a response. Information and Organization, 27(3), 163-170. https://doi.org/10.1016/j.infoandorg.2017.06.003

We address the commentaries of Robey and Mikhaeil, of Mingers, and of Schultze which provided responses to our paper, “Crafting theory to satisfy the requirements of systems science.” We find their responses useful for reflecting on the development o... Read More about Taking the first step with systems theorizing in information systems : a response.

The systemic role of technology in financial instability (2017)
Book Chapter
Demetis, D. (2017). The systemic role of technology in financial instability. In N. Ryder, J. Tucker, & U. Turksen (Eds.), The financial crisis and white collar crime: legislative and policy responses (59-80). Routledge. https://doi.org/10.4324/9781315652009

This chapter examines the role of Information Systems (IS) in creating financial instability by automating critical decision-making processes. By following a systems theoretical approach after Lee and Demetis (2016) and based on a few fundamental sys... Read More about The systemic role of technology in financial instability.

When humans using the IT artifact becomes IT using the human artifact (2017)
Book Chapter
Demetis, D. S., & Lee, A. S. (2017). When humans using the IT artifact becomes IT using the human artifact. In T. X. Bui, & R. Sprague, Jr. (Eds.), Proceedings of the 50th Annual Hawaii International Conference on System Sciences, January 4 - 7, 2017 (5747-5756). Institute of Electrical and Electronics Engineers

Abstract Following Lee & Demetis [20] who showed how systems theorizing can be conducted on the basis of a few systems principles, in this paper, we apply these principles to theorize about the systemic character of technology and investigate the rol... Read More about When humans using the IT artifact becomes IT using the human artifact.

Crafting theory to satisfy the requirements of systems science (2016)
Journal Article
Demetis, D. S., & Lee, A. S. (2016). Crafting theory to satisfy the requirements of systems science. Information and Organization, 26(4), 116-126. https://doi.org/10.1016/j.infoandorg.2016.09.002

Just as Lee, Briggs & Dennis (2014) showed that a rigorous conception of “explanation” leads to requirements for a positivist theory to satisfy, and just as Lee & Hovorka (2015) showed that a rigorous conception of “interpretation” leads to requireme... Read More about Crafting theory to satisfy the requirements of systems science.

The role of information systems in the prevention and detection of transnational and international crime (2014)
Book Chapter
Demetis, D. (2014). The role of information systems in the prevention and detection of transnational and international crime. In I. Bantekas, & E. Mylonaki (Eds.), Criminological Approaches to International Criminal Law (192-221). Cambridge University Press. https://doi.org/10.1017/CBO9781107446700.009

© Cambridge University Press 2014. All around the world criminal activity remains at the forefront of governmental concerns, not only as a problem that distorts the very fabric of society within the confines of national jurisdictions, but also as a p... Read More about The role of information systems in the prevention and detection of transnational and international crime.

Technology and anti-money laundering: A systems theory and risk-based approach (2010)
Book
Demetis, D. S. (2010). Technology and anti-money laundering: A systems theory and risk-based approach. Edward Elgar Publishing. https://doi.org/10.4337/9781849806657

This insightful book examines the influence of information systems on anti-money laundering (AML). It builds on systems theory in order to develop a coherent theoretical framework that can be used for AML research.
By using a case study of a major f... Read More about Technology and anti-money laundering: A systems theory and risk-based approach.

Data growth, the new order of information manipulation and consequences for the AML/ATF domains (2009)
Journal Article
Demetis, D. S. (2009). Data growth, the new order of information manipulation and consequences for the AML/ATF domains. Journal of Money Laundering Control, 12(4), 353-370. https://doi.org/10.1108/13685200910996056

© 2009, Emerald Group Publishing Limited. PurposeThe purpose of this paper is to deconstruct the problem of data growth as a complex contemporary phenomenon and discuss its implications for the domains of anti‐money laundering (AML) and anti‐terroris... Read More about Data growth, the new order of information manipulation and consequences for the AML/ATF domains.