Skip to main content

Research Repository

Advanced Search

All Outputs (28)

The technological construction of reality (2024)
Book
Demetis, D. S., & Angell, I. (2024). The technological construction of reality. Edward Elgar Publishing. https://doi.org/10.4337/9781839101199

This visionary book delves into the world-shaping abilities of modern technology, outlining the potential future transformations that it may impose. By drawing from a range of scholarly insights, Dionysios S. Demetis and Ian O. Angell explore how tec... Read More about The technological construction of reality.

Cybercrime: Understanding the Current State of Literature and Issues Facing CISOs (2024)
Journal Article
Ferreira, C., Park, A., Kietzmann, J., Demetis, D., Flostrand, A., Mccarthy, I., Pitt, L., & Dabirian, A. (2024). Cybercrime: Understanding the Current State of Literature and Issues Facing CISOs. IT Professional, 26(2), 83-89. https://doi.org/10.1109/MITP.2024.3375571

The meteoric rise in cybercrime in recent years has resulted in renewed efforts to stem the potential negative effects of these nefarious activities. In this context, the role of the chief information security officer (CISO) has become one of strateg... Read More about Cybercrime: Understanding the Current State of Literature and Issues Facing CISOs.

Value Sinks: A Process Theory of Corruption Risk during Complex Organizing (2023)
Journal Article
Hazy, J. K., Lichtenstein, B., Demetis, D. S., Backström, T., & Dooley, K. J. (2023). Value Sinks: A Process Theory of Corruption Risk during Complex Organizing. Nonlinear Dynamics, Psychology, and Life Sciences, 27(3), 319-350

Theories and studies of corruption typically focus on individual ethics and agency problems in organizations. In this paper, we use concepts from complexity science to propose a process theory that describes how corruption risk emerges from condition... Read More about Value Sinks: A Process Theory of Corruption Risk during Complex Organizing.

Organised crime - the cyber dimension (2023)
Book Chapter
Demetis, D. (2023). Organised crime - the cyber dimension. In B. Rider (Ed.), A Research Agenda for Organised Crime (177-194). Cheltenham: Edward Elgar Publishing. https://doi.org/10.4337/9781802201369.00014

This chapter reviews a few critical technological developments and reflects both on their trajectory and on the opportunities they harbour for novel forms of cyber-enabled criminality. While the future of organised crime remains forever out of grasp,... Read More about Organised crime - the cyber dimension.

House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA) (2023)
Journal Article
Alshammari, M. M., & Demetis, D. S. (2023). House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA). Journal of Information Systems Security, 19(2), 133-161

Non-malicious insider threats continue to pose a significant concern to an organisation’s cybersecurity defence strategy, yet organisations still struggle to contain such insider threats. A critical pillar for doing so rests on the development and mo... Read More about House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA).

Interoperability: Our exciting and terrifying Web3 future (2022)
Journal Article
Park, A., Wilson, M., Robson, K., Demetis, D., & Kietzmann, J. (2022). Interoperability: Our exciting and terrifying Web3 future. Business Horizons, https://doi.org/10.1016/j.bushor.2022.10.005

This article introduces the next major generational evolution of the web: Web3. We review the fundamental evolution of the internet and the web over the past three decades, including a brief presentation of the publications in Business Horizons that... Read More about Interoperability: Our exciting and terrifying Web3 future.

Re-thinking de-risking: a systems theoretical approach (2021)
Journal Article
Tambe, N., & Demetis, D. (in press). Re-thinking de-risking: a systems theoretical approach. Journal of Money Laundering Control, https://doi.org/10.1108/JMLC-04-2021-0030

Purpose: This paper aims to explain the de-risking phenomenon through Luhmann’s risk/danger model and demonstrate that de-risking should be facilitated and encouraged. Design/methodology/approach: The paper applies Luhmann’s system theory and more sp... Read More about Re-thinking de-risking: a systems theoretical approach.

Online child sexual exploitation: a new MIS challenge (2021)
Journal Article
Demetis, D. S., & Kietzmann, J. (2021). Online child sexual exploitation: a new MIS challenge. Journal of the Association for Information Systems, 22(1), 5-40. https://doi.org/10.17705/1jais.00652

© 2021, Association for Information Systems. All rights reserved. This paper deals with the difficult yet increasingly important MIS phenomenon of online child sexual exploitation (online CSE). Through the use of secondary and publicly available data... Read More about Online child sexual exploitation: a new MIS challenge.

A second order cybernetics approach to the deconstruction of risk in the domain of anti money laundering (2020)
Thesis
Bearpark, N. T. (2020). A second order cybernetics approach to the deconstruction of risk in the domain of anti money laundering. (Thesis). University of Hull. Retrieved from https://hull-repository.worktribe.com/output/4224627

This research examines the application of the risk-based approach (RBA) in the context of anti-money laundering (AML) and explores how it drives risk interpretation and deconstruction within relevant AML stakeholders.
Review of existing literature i... Read More about A second order cybernetics approach to the deconstruction of risk in the domain of anti money laundering.

Breaking bad online: a synthesis of the darker sides of social networking sites (2019)
Journal Article
Demetis, D. S. (2020). Breaking bad online: a synthesis of the darker sides of social networking sites. European Management Journal, 38(1), 33-44. https://doi.org/10.1016/j.emj.2019.12.013

This essay deconstructs the ultra-dark side of social media and explores the variety of ‘bad’ behaviour online by looking at a wide spectrum of exploitative practices. Through the use of primary data from an online platform, we posit the question ‘Wh... Read More about Breaking bad online: a synthesis of the darker sides of social networking sites.

Economic Simulation of Cryptocurrencies and Their Control Mechanisms (2019)
Journal Article
Mainelli, M. R., Leitch, M., & Demetis, D. (2019). Economic Simulation of Cryptocurrencies and Their Control Mechanisms. Ledger, 4, 48-67. https://doi.org/10.5915/LEDGER.2019.130

A cryptocurrency needs a relatively stable value if it is to fulfill the traditional functions of money and be useful as a currency. To achieve this, controls are needed within the ecosystem of the cryptocurrency. Although a simulation cannot predict... Read More about Economic Simulation of Cryptocurrencies and Their Control Mechanisms.

An information systems security framework for the e-Government Programme of Jordan (2019)
Thesis
Samara, N. K. A. (2019). An information systems security framework for the e-Government Programme of Jordan. (Thesis). University of Hull. Retrieved from https://hull-repository.worktribe.com/output/4222682

Any e-government programme provides e-services as one of the most important means by which the interaction between citizens, businesses and governments takes place. This has brought great opportunities but also raises serious cybersecurity challenges... Read More about An information systems security framework for the e-Government Programme of Jordan.

An observer-relative systems approach to information (2019)
Presentation / Conference Contribution
Demetis, D., & Lee, A. (2019, January). An observer-relative systems approach to information. Presented at Hawaii International Conference on Systems Sciences, Maui, Hawaii

By returning to the foundational principles of second-order cybernetics and resting on the central role of the observer, this essay explores how the distinction between data/information can be conceptualized. Using systems theory, we derive a series... Read More about An observer-relative systems approach to information.

When humans using the IT artifact becomes IT using the human artifact (2018)
Presentation / Conference Contribution
Lee, A. S., Demetis, D. S., & Lee, A. When humans using the IT artifact becomes IT using the human artifact. Presented at Hawaii International Conference on System Sciences

Following Demetis & Lee (2016) who showed how systems theorizing can be conducted on the basis of a few systems principles, in this conceptual paper, we apply these principles to theorize about the systemic character of technology and investigate the... Read More about When humans using the IT artifact becomes IT using the human artifact.

Economic simulation of cryptocurrencies (2018)
Journal Article
Mainelli, M. R., Leitch, M., & Demetis, D. (2018). Economic simulation of cryptocurrencies. Capco Journal, 47, 89-101

Cryptocurrencies have the potential to become effective currencies that give a higher level of macroeconomic control, thanks to the information that is available about holdings and transactions, and the potential for automated control mechanisms. How... Read More about Economic simulation of cryptocurrencies.

Fighting money laundering with technology: a case study of Bank X in the UK (2017)
Journal Article
Demetis, D. S. (2018). Fighting money laundering with technology: a case study of Bank X in the UK. Decision Support Systems, 105, 96-107. https://doi.org/10.1016/j.dss.2017.11.005

This paper presents a longitudinal interpretive case study of a UK bank’s efforts to combat Money Laundering (ML) by expanding the scope of its profiling of ML behaviour. The concept of structural coupling, taken from systems theory, is used to refle... Read More about Fighting money laundering with technology: a case study of Bank X in the UK.

Taking the first step with systems theorizing in information systems : a response (2017)
Journal Article
Demetis, D. S., & Lee, A. S. (2017). Taking the first step with systems theorizing in information systems : a response. Information and Organization, 27(3), 163-170. https://doi.org/10.1016/j.infoandorg.2017.06.003

We address the commentaries of Robey and Mikhaeil, of Mingers, and of Schultze which provided responses to our paper, “Crafting theory to satisfy the requirements of systems science.” We find their responses useful for reflecting on the development o... Read More about Taking the first step with systems theorizing in information systems : a response.

The systemic role of technology in financial instability (2017)
Book Chapter
Demetis, D. (2017). The systemic role of technology in financial instability. In N. Ryder, J. Tucker, & U. Turksen (Eds.), The financial crisis and white collar crime: legislative and policy responses (59-80). Routledge. https://doi.org/10.4324/9781315652009

This chapter examines the role of Information Systems (IS) in creating financial instability by automating critical decision-making processes. By following a systems theoretical approach after Lee and Demetis (2016) and based on a few fundamental sys... Read More about The systemic role of technology in financial instability.