Skip to main content

Research Repository

Advanced Search

Outputs (27)

Value Sinks: A Process Theory of Corruption Risk during Complex Organizing (2023)
Journal Article
Hazy, J. K., Lichtenstein, B., Demetis, D. S., Backström, T., & Dooley, K. J. (2023). Value Sinks: A Process Theory of Corruption Risk during Complex Organizing. Nonlinear Dynamics, Psychology, and Life Sciences, 27(3), 319-350

Theories and studies of corruption typically focus on individual ethics and agency problems in organizations. In this paper, we use concepts from complexity science to propose a process theory that describes how corruption risk emerges from condition... Read More about Value Sinks: A Process Theory of Corruption Risk during Complex Organizing.

Organised crime - the cyber dimension (2023)
Book Chapter
Demetis, D. (2023). Organised crime - the cyber dimension. In B. Rider (Ed.), A Research Agenda for Organised Crime (177-194). Cheltenham: Edward Elgar Publishing. https://doi.org/10.4337/9781802201369.00014

This chapter reviews a few critical technological developments and reflects both on their trajectory and on the opportunities they harbour for novel forms of cyber-enabled criminality. While the future of organised crime remains forever out of grasp,... Read More about Organised crime - the cyber dimension.

House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA) (2023)
Journal Article
Alshammari, M. M., & Demetis, D. S. (2023). House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA). Journal of Information Systems Security, 19(2), 133-161

Non-malicious insider threats continue to pose a significant concern to an organisation’s cybersecurity defence strategy, yet organisations still struggle to contain such insider threats. A critical pillar for doing so rests on the development and mo... Read More about House of Cards: developing KPIs for monitoring cybersecurity awareness (CSA).

Interoperability: Our exciting and terrifying Web3 future (2022)
Journal Article
Park, A., Wilson, M., Robson, K., Demetis, D., & Kietzmann, J. (2022). Interoperability: Our exciting and terrifying Web3 future. Business Horizons, https://doi.org/10.1016/j.bushor.2022.10.005

This article introduces the next major generational evolution of the web: Web3. We review the fundamental evolution of the internet and the web over the past three decades, including a brief presentation of the publications in Business Horizons that... Read More about Interoperability: Our exciting and terrifying Web3 future.

Re-thinking de-risking: a systems theoretical approach (2021)
Journal Article
Tambe, N., & Demetis, D. (in press). Re-thinking de-risking: a systems theoretical approach. Journal of Money Laundering Control, https://doi.org/10.1108/JMLC-04-2021-0030

Purpose: This paper aims to explain the de-risking phenomenon through Luhmann’s risk/danger model and demonstrate that de-risking should be facilitated and encouraged. Design/methodology/approach: The paper applies Luhmann’s system theory and more sp... Read More about Re-thinking de-risking: a systems theoretical approach.

Online child sexual exploitation: a new MIS challenge (2021)
Journal Article
Demetis, D. S., & Kietzmann, J. (2021). Online child sexual exploitation: a new MIS challenge. Journal of the Association for Information Systems, 22(1), 5-40. https://doi.org/10.17705/1jais.00652

© 2021, Association for Information Systems. All rights reserved. This paper deals with the difficult yet increasingly important MIS phenomenon of online child sexual exploitation (online CSE). Through the use of secondary and publicly available data... Read More about Online child sexual exploitation: a new MIS challenge.

A second order cybernetics approach to the deconstruction of risk in the domain of anti money laundering (2020)
Thesis
Bearpark, N. T. (2020). A second order cybernetics approach to the deconstruction of risk in the domain of anti money laundering. (Thesis). University of Hull. Retrieved from https://hull-repository.worktribe.com/output/4224627

This research examines the application of the risk-based approach (RBA) in the context of anti-money laundering (AML) and explores how it drives risk interpretation and deconstruction within relevant AML stakeholders. Review of existing literature i... Read More about A second order cybernetics approach to the deconstruction of risk in the domain of anti money laundering.

Breaking bad online: a synthesis of the darker sides of social networking sites (2019)
Journal Article
Demetis, D. S. (2020). Breaking bad online: a synthesis of the darker sides of social networking sites. European Management Journal, 38(1), 33-44. https://doi.org/10.1016/j.emj.2019.12.013

This essay deconstructs the ultra-dark side of social media and explores the variety of ‘bad’ behaviour online by looking at a wide spectrum of exploitative practices. Through the use of primary data from an online platform, we posit the question ‘Wh... Read More about Breaking bad online: a synthesis of the darker sides of social networking sites.

Economic Simulation of Cryptocurrencies and Their Control Mechanisms (2019)
Journal Article
Mainelli, M. R., Leitch, M., & Demetis, D. (2019). Economic Simulation of Cryptocurrencies and Their Control Mechanisms. Ledger, 4, 48-67. https://doi.org/10.5915/LEDGER.2019.130

A cryptocurrency needs a relatively stable value if it is to fulfill the traditional functions of money and be useful as a currency. To achieve this, controls are needed within the ecosystem of the cryptocurrency. Although a simulation cannot predict... Read More about Economic Simulation of Cryptocurrencies and Their Control Mechanisms.

An information systems security framework for the e-Government Programme of Jordan (2019)
Thesis
Samara, N. K. A. (2019). An information systems security framework for the e-Government Programme of Jordan. (Thesis). University of Hull. Retrieved from https://hull-repository.worktribe.com/output/4222682

Any e-government programme provides e-services as one of the most important means by which the interaction between citizens, businesses and governments takes place. This has brought great opportunities but also raises serious cybersecurity challenges... Read More about An information systems security framework for the e-Government Programme of Jordan.

An observer-relative systems approach to information (2019)
Conference Proceeding
Demetis, D., & Lee, A. (2019). An observer-relative systems approach to information. In Proceedings of the 52nd Annual Hawaii International Conference on System Sciences (6300-6309)

By returning to the foundational principles of second-order cybernetics and resting on the central role of the observer, this essay explores how the distinction between data/information can be conceptualized. Using systems theory, we derive a series... Read More about An observer-relative systems approach to information.

When humans using the IT artifact becomes IT using the human artifact (2018)
Journal Article
Lee, A. S., Demetis, D. S., & Lee, A. (2018). When humans using the IT artifact becomes IT using the human artifact. Journal of the Association for Information Systems, 19(10), 929-952. https://doi.org/10.17705/1jais.00514

Following Demetis & Lee (2016) who showed how systems theorizing can be conducted on the basis of a few systems principles, in this conceptual paper, we apply these principles to theorize about the systemic character of technology and investigate the... Read More about When humans using the IT artifact becomes IT using the human artifact.

Economic simulation of cryptocurrencies (2018)
Journal Article
Mainelli, M. R., Leitch, M., & Demetis, D. (2018). Economic simulation of cryptocurrencies. Capco Journal, 47, 89-101

Cryptocurrencies have the potential to become effective currencies that give a higher level of macroeconomic control, thanks to the information that is available about holdings and transactions, and the potential for automated control mechanisms. How... Read More about Economic simulation of cryptocurrencies.

Fighting money laundering with technology: a case study of Bank X in the UK (2017)
Journal Article
Demetis, D. S. (2018). Fighting money laundering with technology: a case study of Bank X in the UK. Decision Support Systems, 105, 96-107. https://doi.org/10.1016/j.dss.2017.11.005

This paper presents a longitudinal interpretive case study of a UK bank’s efforts to combat Money Laundering (ML) by expanding the scope of its profiling of ML behaviour. The concept of structural coupling, taken from systems theory, is used to refle... Read More about Fighting money laundering with technology: a case study of Bank X in the UK.

Taking the first step with systems theorizing in information systems : a response (2017)
Journal Article
Demetis, D. S., & Lee, A. S. (2017). Taking the first step with systems theorizing in information systems : a response. Information and Organization, 27(3), 163-170. https://doi.org/10.1016/j.infoandorg.2017.06.003

We address the commentaries of Robey and Mikhaeil, of Mingers, and of Schultze which provided responses to our paper, “Crafting theory to satisfy the requirements of systems science.” We find their responses useful for reflecting on the development o... Read More about Taking the first step with systems theorizing in information systems : a response.

The systemic role of technology in financial instability (2017)
Book Chapter
Demetis, D. (2017). The systemic role of technology in financial instability. In N. Ryder, J. Tucker, & U. Turksen (Eds.), The financial crisis and white collar crime: legislative and policy responses (59-80). Abingdon, Oxon: Routledge. https://doi.org/10.4324/9781315652009

This chapter examines the role of Information Systems (IS) in creating financial instability by automating critical decision-making processes. By following a systems theoretical approach after Lee and Demetis (2016) and based on a few fundamental sys... Read More about The systemic role of technology in financial instability.

When humans using the IT artifact becomes IT using the human artifact (2017)
Book Chapter
Demetis, D. S., & Lee, A. S. (2017). When humans using the IT artifact becomes IT using the human artifact. In T. X. Bui, & R. Sprague, Jr. (Eds.), Proceedings of the 50th Annual Hawaii International Conference on System Sciences, January 4 - 7, 2017 (5747-5756). Los Alamitos, Calif.: Institute of Electrical and Electronics Engineers

Abstract Following Lee & Demetis [20] who showed how systems theorizing can be conducted on the basis of a few systems principles, in this paper, we apply these principles to theorize about the systemic character of technology and investigate the rol... Read More about When humans using the IT artifact becomes IT using the human artifact.

Crafting theory to satisfy the requirements of systems science (2016)
Journal Article
Demetis, D. S., & Lee, A. S. (2016). Crafting theory to satisfy the requirements of systems science. Information and Organization, 26(4), 116-126. https://doi.org/10.1016/j.infoandorg.2016.09.002

Just as Lee, Briggs & Dennis (2014) showed that a rigorous conception of “explanation” leads to requirements for a positivist theory to satisfy, and just as Lee & Hovorka (2015) showed that a rigorous conception of “interpretation” leads to requireme... Read More about Crafting theory to satisfy the requirements of systems science.

The role of information systems in the prevention and detection of transnational and international crime (2014)
Book Chapter
Demetis, D. (2014). The role of information systems in the prevention and detection of transnational and international crime. In I. Bantekas, & E. Mylonaki (Eds.), Criminological Approaches to International Criminal Law (192-221). Cambridge: Cambridge University Press. https://doi.org/10.1017/CBO9781107446700.009

© Cambridge University Press 2014. All around the world criminal activity remains at the forefront of governmental concerns, not only as a problem that distorts the very fabric of society within the confines of national jurisdictions, but also as a p... Read More about The role of information systems in the prevention and detection of transnational and international crime.

Technology as an observing system : a 2nd order cybernetics approach (2014)
Conference Proceeding
Demetis, D. (2014). Technology as an observing system : a 2nd order cybernetics approach.

The role of technology in modern society is becoming fundamental to society itself as the boundary between technological utilization and technological interference narrows. Technology penetrates the core of an ever-increasing number of application do... Read More about Technology as an observing system : a 2nd order cybernetics approach.

Technology and anti-money laundering: A systems theory and risk-based approach (2010)
Book
Demetis, D. S. (2010). Technology and anti-money laundering: A systems theory and risk-based approach. Cheltenham: Edward Elgar Publishing. https://doi.org/10.4337/9781849806657

This insightful book examines the influence of information systems on anti-money laundering (AML). It builds on systems theory in order to develop a coherent theoretical framework that can be used for AML research. By using a case study of a major f... Read More about Technology and anti-money laundering: A systems theory and risk-based approach.

Data growth, the new order of information manipulation and consequences for the AML/ATF domains (2009)
Journal Article
Demetis, D. S. (2009). Data growth, the new order of information manipulation and consequences for the AML/ATF domains. Journal of Money Laundering Control, 12(4), 353-370. https://doi.org/10.1108/13685200910996056

© 2009, Emerald Group Publishing Limited. PurposeThe purpose of this paper is to deconstruct the problem of data growth as a complex contemporary phenomenon and discuss its implications for the domains of anti‐money laundering (AML) and anti‐terroris... Read More about Data growth, the new order of information manipulation and consequences for the AML/ATF domains.

The risk-based approach to AML : representation, paradox, and the 3rd directive (2007)
Journal Article
Demetis, D. S., & Angell, I. O. (2007). The risk-based approach to AML : representation, paradox, and the 3rd directive. Journal of Money Laundering Control, 10(4), 412-428. https://doi.org/10.1108/13685200710830907

© 2007, Emerald Group Publishing Limited. Purpose. This paper seeks to deconstruct the proposed risk‐based approach to anti‐money laundering (AML) and to relate it to the text of the European Union's 3rd Directive. The paper also aims to discuss a... Read More about The risk-based approach to AML : representation, paradox, and the 3rd directive.

Down with strategy: In defense of short-term thinking (2007)
Journal Article
Ezer, J., & Demetis, D. S. (2007). Down with strategy: In defense of short-term thinking. Journal of Business Strategy, 28(1), 57-63. https://doi.org/10.1108/02756660710723224

Purpose - The aim of this paper is to argue that the need for strategy is overstated and that organizations should celebrate short-term thinking. Design/methodology/approach - The paper presents a case study of a medium-sized software company in Cana... Read More about Down with strategy: In defense of short-term thinking.