Evaluation of Digital Shadow Economy Prevention Measures

Open access

Abstract

Although during the past few years the scopes of shadow economy in Lithuania have slightly decreased, different forms of this phenomenon, in particular digital shadow activities, still generate a significant part of the overall value added. As no constant estimations of the scope of digital shadow economy have been made in Lithuania, alleviation of this problem is based on consequence fighting rather than reason elimination. Digital shadow economy poses a significant challenge for law enforcement agencies concerning its investigation and prevention. Hence, it is purposeful to research both theoretical and practical aspects of digital shadow economy prevention in order to identify the measures that could be used for the efficient reduction of the scope of this phenomenon. The aim of this research is to identify the measures of digital shadow economy prevention and compare the attitudes of governmental institutions and consumers towards the efficiency of these measures. The results of the empirical research showed that both consumers and experts agree that the level of tax morale has to be raised not only by using the measures of self-education but also by introducing long-term educational programmes; second, public authorities should ensure business friendly environment, actively implement the principles of justice and officially acknowledge and announce the concept of digital shadow economy; finally, for more efficient detection of the cases of digital shadow activities, it is necessary to reinforce current labour resources that should be specially trained to be able to disclose revenue hiding and tax evasion schemes, employed in e-trade.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • Arli D. Tjiptono F. Porto R. (2015). The impact of moral equity relativism and attitude on individuals’ digital piracy behaviour in a developing country. Marketing Intelligence & Planning 33 (3) 348-365.

  • Bossler A. M. Holt T. H. (2012). Patrol officers' perceived role in responding to cybercrime. Policing: An International Journal of Police Strategies & Management 35 (1) 165-181. http://dx.doi.org/10.1108/13639511211215504

  • Brenner S. W. (2008). Cyberthreats: The Emerging Fault Lines of the Nation State Oxford University Press New York NY.

  • Camarero C. Anton C. Rodriguez J. (2014). Technological and ethical antecedents of e-book piracy and price acceptance: Evidence from the Spanish case. The Electronic Library 32 (4) 542-566. http://dx.doi.org/10.1108/EL-11-2012-0149

  • Duncan D. F. White J. B. and Nicholson T. (2003). Using internet based surveys to reach hidden populations: case of non-abusive illicit drug users. American Journal of Health Behaviour 27 (3) 208-18.

  • Hinduja S. (2007). Computer crime investigations in the United States: leveraging knowledge from the past to address the future. International Journal of Cyber Criminology (1) 1-26.

  • Holt T. J. Blevins K. R. and Burkert N. (2010). Considering the pedophile subculture on-line. Sexual Abuse: Journal of Research and Treatment (22) 3-24.

  • Holz T. Engelberth M. Freiling F. (2012). Learning more about the underground economy: A case-study of keyloggers and dropzones. In ESORICS Proceedings (9) 1-18.

  • Kim D. J. Steinfield C. and Lai Y. (2008). Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decision Support Systems 44 (4) 1000-1015.

  • Lithuanian Free Market Institute (2014). Lietuvos seseline ekonomika. [Accessed 12.01.2016]. Available from Internet: http://files.lrinka.lt/Seseline_ekonomika/LSE3.pdf

  • Manolas G. Rontos K. Sfakianakis G. Vavouras I. (2013). The Determinants of the Shadow Economy: The Case of Greece. International Journal of Criminology and Sociological Theory 6 (1) 1036-1047.

  • Mayayise T. Osunmakinde I. O. (2014). E-commerce assurance models and trustworthiness issues: an empirical study. Information Management & Computer Security 22 (1) 76-96. http://dx.doi.org/10.1108/IMCS-01-2013-0001

  • McQuade S. (2006). Technology-enabled crime policing and security. Journal of Technology Studies (32) 32-42.

  • Mello J. P. (2013). Cybercrime fueled by mature digital underground. [Accessed 10.10.2015]. Available from Internet: http://www.csoonline.com/article/2133649/identity-access/cybercrime-fueled-by-mature-digitalunderground.html

  • Morz B. (2011). Migration into the Shadow: Unregistered Work in Poland. Journal of Management and Financial Sciences 4 (6) 73-112.

  • Russel B. (2010). Revenue Administration - Managing the Shadow Economy. Technical Notes and Manual IMF.

  • Senjo S. R. (2004). An analysis of computer-related crime: comparing police officer perceptions with empirical data. Security Journal (17) 55-71.

  • Smith G. S. (2015). Management models for international cybercrime. Journal of Financial Crime 22(1) 104-125.

  • Swire P. (2009). No cop on the beat: underenforcement in e-commerce and cybercrime. Journal of Telecommunications and High Technology Law (7) 107-26.

  • Taylor R. W. Fritsch E. J. Liederbach J. and Holt T. J. (2010). Digital Crime and Digital Terrorism 2nd ed. Pearson Prentice Hall Upper Saddle River.

  • Taylor S. A. (2012). Evaluating digital piracy intentions on behaviours. Journal of Services Marketing 26 (7) 472-483.

  • Vershinina N. Barrett R. and Meyer M. (2009). Polish immigrants in Leicester: forms of capital underpinning entrepreneurial activity Leicester Business School Occasional Paper Series N86 (August) Leicester Business School Leicester.

  • Vershinina N.; Rodionova Y. (2011). Methodological issues in studying hidden populations operating in informal economy International Journal of Sociology and Social Policy 31(11/12) 697-716.

  • Vida I. Koklic M. K. Kukar-Kinney M. Penz E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Research in Interactive Marketing 6(4) 298-313.

  • Vlachos V. Minou M. Assimakopouos V. Toska A. (2011). The landscape of cybercrime in Greece. Information Management & Computer Security19(2) 113-123.

  • Wall D. S. Williams M. (2007). Policing diversity in the digital age: maintaining order in virtual communities. Criminology and Criminal Justice (7) 391-415.

  • Williams P.; Nicholas D.; Rowlands I. (2010). The attitudes and behaviours of illegal downloaders. Aslib Proceedings 62(3) 283-301.

  • Yip M. Shadbolt N. Tiropanis N. Webber C. (2012). The digital underground economy: A social network approach to understanding cybercrime: Digital Futures 2012. In the third Annual Digital Economy All Hands Conference. [Accessed 10.10.2015]. Available from Internet Available from Internet: http://eprints.soton.ac.uk/343351/1/yip_de2012_submission.pdf

Search
Journal information
Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 287 135 3
PDF Downloads 219 136 15