Skip to main content

Research Repository

Advanced Search

All Outputs (14)

Value Sinks: A Process Theory of Corruption Risk during Complex Organizing (2023)
Journal Article
Hazy, J. K., Lichtenstein, B., Demetis, D. S., Backström, T., & Dooley, K. J. (2023). Value Sinks: A Process Theory of Corruption Risk during Complex Organizing. Nonlinear Dynamics, Psychology, and Life Sciences, 27(3), 319-350

Theories and studies of corruption typically focus on individual ethics and agency problems in organizations. In this paper, we use concepts from complexity science to propose a process theory that describes how corruption risk emerges from condition... Read More about Value Sinks: A Process Theory of Corruption Risk during Complex Organizing.

House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA) (2023)
Journal Article
Alshammari, M. M., & Demetis, D. S. (2023). House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA). Journal of Information Systems Security, 19(2), 133-161

Non-malicious insider threats continue to pose a significant concern to an organisation’s cybersecurity defence strategy, yet organisations still struggle to contain such insider threats. A critical pillar for doing so rests on the development and mo... Read More about House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA).

Interoperability: Our exciting and terrifying Web3 future (2022)
Journal Article
Park, A., Wilson, M., Robson, K., Demetis, D., & Kietzmann, J. (2022). Interoperability: Our exciting and terrifying Web3 future. Business Horizons, https://doi.org/10.1016/j.bushor.2022.10.005

This article introduces the next major generational evolution of the web: Web3. We review the fundamental evolution of the internet and the web over the past three decades, including a brief presentation of the publications in Business Horizons that... Read More about Interoperability: Our exciting and terrifying Web3 future.

Re-thinking de-risking: a systems theoretical approach (2021)
Journal Article
Tambe, N., & Demetis, D. (in press). Re-thinking de-risking: a systems theoretical approach. Journal of Money Laundering Control, https://doi.org/10.1108/JMLC-04-2021-0030

Purpose: This paper aims to explain the de-risking phenomenon through Luhmann’s risk/danger model and demonstrate that de-risking should be facilitated and encouraged. Design/methodology/approach: The paper applies Luhmann’s system theory and more sp... Read More about Re-thinking de-risking: a systems theoretical approach.

Online child sexual exploitation: a new MIS challenge (2021)
Journal Article
Demetis, D. S., & Kietzmann, J. (2021). Online child sexual exploitation: a new MIS challenge. Journal of the Association for Information Systems, 22(1), 5-40. https://doi.org/10.17705/1jais.00652

© 2021, Association for Information Systems. All rights reserved. This paper deals with the difficult yet increasingly important MIS phenomenon of online child sexual exploitation (online CSE). Through the use of secondary and publicly available data... Read More about Online child sexual exploitation: a new MIS challenge.

Breaking bad online: a synthesis of the darker sides of social networking sites (2019)
Journal Article
Demetis, D. S. (2020). Breaking bad online: a synthesis of the darker sides of social networking sites. European Management Journal, 38(1), 33-44. https://doi.org/10.1016/j.emj.2019.12.013

This essay deconstructs the ultra-dark side of social media and explores the variety of ‘bad’ behaviour online by looking at a wide spectrum of exploitative practices. Through the use of primary data from an online platform, we posit the question ‘Wh... Read More about Breaking bad online: a synthesis of the darker sides of social networking sites.

Economic Simulation of Cryptocurrencies and Their Control Mechanisms (2019)
Journal Article
Mainelli, M. R., Leitch, M., & Demetis, D. (2019). Economic Simulation of Cryptocurrencies and Their Control Mechanisms. Ledger, 4, 48-67. https://doi.org/10.5915/LEDGER.2019.130

A cryptocurrency needs a relatively stable value if it is to fulfill the traditional functions of money and be useful as a currency. To achieve this, controls are needed within the ecosystem of the cryptocurrency. Although a simulation cannot predict... Read More about Economic Simulation of Cryptocurrencies and Their Control Mechanisms.

Economic simulation of cryptocurrencies (2018)
Journal Article
Mainelli, M. R., Leitch, M., & Demetis, D. (2018). Economic simulation of cryptocurrencies. Capco Journal, 47, 89-101

Cryptocurrencies have the potential to become effective currencies that give a higher level of macroeconomic control, thanks to the information that is available about holdings and transactions, and the potential for automated control mechanisms. How... Read More about Economic simulation of cryptocurrencies.

Fighting money laundering with technology: a case study of Bank X in the UK (2017)
Journal Article
Demetis, D. S. (2018). Fighting money laundering with technology: a case study of Bank X in the UK. Decision Support Systems, 105, 96-107. https://doi.org/10.1016/j.dss.2017.11.005

This paper presents a longitudinal interpretive case study of a UK bank’s efforts to combat Money Laundering (ML) by expanding the scope of its profiling of ML behaviour. The concept of structural coupling, taken from systems theory, is used to refle... Read More about Fighting money laundering with technology: a case study of Bank X in the UK.

Taking the first step with systems theorizing in information systems : a response (2017)
Journal Article
Demetis, D. S., & Lee, A. S. (2017). Taking the first step with systems theorizing in information systems : a response. Information and Organization, 27(3), 163-170. https://doi.org/10.1016/j.infoandorg.2017.06.003

We address the commentaries of Robey and Mikhaeil, of Mingers, and of Schultze which provided responses to our paper, “Crafting theory to satisfy the requirements of systems science.” We find their responses useful for reflecting on the development o... Read More about Taking the first step with systems theorizing in information systems : a response.

Crafting theory to satisfy the requirements of systems science (2016)
Journal Article
Demetis, D. S., & Lee, A. S. (2016). Crafting theory to satisfy the requirements of systems science. Information and Organization, 26(4), 116-126. https://doi.org/10.1016/j.infoandorg.2016.09.002

Just as Lee, Briggs & Dennis (2014) showed that a rigorous conception of “explanation” leads to requirements for a positivist theory to satisfy, and just as Lee & Hovorka (2015) showed that a rigorous conception of “interpretation” leads to requireme... Read More about Crafting theory to satisfy the requirements of systems science.

Data growth, the new order of information manipulation and consequences for the AML/ATF domains (2009)
Journal Article
Demetis, D. S. (2009). Data growth, the new order of information manipulation and consequences for the AML/ATF domains. Journal of Money Laundering Control, 12(4), 353-370. https://doi.org/10.1108/13685200910996056

© 2009, Emerald Group Publishing Limited. PurposeThe purpose of this paper is to deconstruct the problem of data growth as a complex contemporary phenomenon and discuss its implications for the domains of anti‐money laundering (AML) and anti‐terroris... Read More about Data growth, the new order of information manipulation and consequences for the AML/ATF domains.

The risk-based approach to AML : representation, paradox, and the 3rd directive (2007)
Journal Article
Demetis, D. S., & Angell, I. O. (2007). The risk-based approach to AML : representation, paradox, and the 3rd directive. Journal of Money Laundering Control, 10(4), 412-428. https://doi.org/10.1108/13685200710830907

© 2007, Emerald Group Publishing Limited. Purpose. This paper seeks to deconstruct the proposed risk‐based approach to anti‐money laundering (AML) and to relate it to the text of the European Union's 3rd Directive. The paper also aims to discuss a... Read More about The risk-based approach to AML : representation, paradox, and the 3rd directive.