Search results
1 – 10 of 165Iftikhar Ahmad, Salim Khan and Shahid Iqbal
The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…
Abstract
Purpose
The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.
Design/methodology/approach
In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.
Findings
The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.
Research limitations/implications
This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.
Practical implications
This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.
Social implications
This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.
Originality/value
This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.
Details
Keywords
K.V. Sheelavathy and V. Udaya Rani
Internet of Things (IoT) is a network, which provides the connection with various physical objects such as smart machines, smart home appliance and so on. The physical objects are…
Abstract
Purpose
Internet of Things (IoT) is a network, which provides the connection with various physical objects such as smart machines, smart home appliance and so on. The physical objects are allocated with a unique internet address, namely, Internet Protocol, which is used to perform the data broadcasting with the external objects using the internet. The sudden increment in the number of attacks generated by intruders, causes security-related problems in IoT devices while performing the communication. The main purpose of this paper is to develop an effective attack detection to enhance the robustness against the attackers in IoT.
Design/methodology/approach
In this research, the lasso regression algorithm is proposed along with ensemble classifier for identifying the IoT attacks. The lasso algorithm is used for the process of feature selection that modeled fewer parameters for the sparse models. The type of regression is analyzed for showing higher levels when certain parts of model selection is needed for parameter elimination. The lasso regression obtains the subset for predictors to lower the prediction error with respect to the quantitative response variable. The lasso does not impose a constraint for modeling the parameters caused the coefficients with some variables shrink as zero. The selected features are classified by using an ensemble classifier, that is important for linear and nonlinear types of data in the dataset, and the models are combined for handling these data types.
Findings
The lasso regression with ensemble classifier–based attack classification comprises distributed denial-of-service and Mirai botnet attacks which achieved an improved accuracy of 99.981% than the conventional deep neural network (DNN) methods.
Originality/value
Here, an efficient lasso regression algorithm is developed for extracting the features to perform the network anomaly detection using ensemble classifier.
Details
Keywords
Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…
Abstract
Purpose
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.
Design/methodology/approach
For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.
Findings
The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.
Originality/value
Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.
Details
Keywords
Natile Nonhlanhla Cele and Sheila Kwenda
The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…
Abstract
Purpose
The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.
Design/methodology/approach
Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.
Findings
A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.
Originality/value
With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.
Details
Keywords
Jayaprada Putrevu and Charilaos Mertzanis
This paper aims to present a comprehensive overview of the emergence and significance of digital payments, focusing on their impact on competitiveness and the need for policy…
Abstract
Purpose
This paper aims to present a comprehensive overview of the emergence and significance of digital payments, focusing on their impact on competitiveness and the need for policy interventions. In addition, it explores the design of policies that promote the adoption of digital payments, highlighting the benefits they offer to providers and users.
Design/methodology/approach
The paper examines the technological advances that have driven the growth of digital payment systems. It identifies key requirements for successful adoption and discusses the associated risks, along with potential strategies to mitigate these risks.
Findings
The findings emphasize the importance of responsible implementation and safeguarding the well-being of end users to fully realize the benefits of digital payment adoption. Understanding the inherent risks and establishing effective risk mitigation mechanisms are crucial. This necessitates the development of appropriate infrastructure to support the provision of digital payment services.
Research limitations/implications
More research is needed to gain deeper insights into how emerging global trends in financial technology should be analyzed and understood by policymakers, service providers and users.
Practical implications
The findings of this study can guide policymakers, private sector managers and consumers in comprehending the effects of emerging digitalization trends and determining their adoption responses accordingly.
Originality/value
This paper stands out as one of the few research contributions that provide comprehensive and actionable policy recommendations to facilitate a smooth transition to a digital payments ecosystem that benefits all stakeholders.
Details
Keywords
Dilek Şahin, Mehmet Nurullah Kurutkan and Tuba Arslan
Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services…
Abstract
Purpose
Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services received, whether public or private. The use of the application by patients and physicians has provided efficiency and cost advantages. The success of e-Nabız depends on the level of technology acceptance of health-care service providers and recipients. While there is a large research literature on the technology acceptance of service recipients in health-care services, there is a limited number of studies on physicians providing services. This study aims to determine the level of influence of trust and privacy variables in addition to performance expectancy, effort expectancy, social influence and facilitating factors in the unified theory of acceptance and use of technology (UTAUT) model on the intention and behavior of using e-Nabız application.
Design/methodology/approach
The population of the study consisted of general practitioners and specialist physicians actively working in any health facility in Turkey. Data were collected cross-sectionally from 236 physicians on a voluntary basis through a questionnaire. The response rate of data collection was calculated as 47.20%. Data were collected cross-sectionally from 236 physicians through a questionnaire. Descriptive statistics, correlation analysis and structural equation modeling were used to analyze the data.
Findings
The study found that performance expectancy, effort expectancy, trust and perceived privacy had a significant effect on physicians’ behavioral intentions to adopt the e-Nabız system. In addition, facilitating conditions and behavioral intention were determinants of usage behavior (p < 0.05). However, no significant relationship was found between social influence and behavioral intention (p > 0.05).
Originality/value
This study confirms that the UTAUT model provides an appropriate framework for predicting factors influencing physicians’ behaviors and intention to use e-Nabız. In addition, the empirical findings show that trust and perceived privacy, which are additionally considered in the model, are also influential.
Details
Keywords
Presently, existing electric car sharing platforms are based on a centralized architecture which are faced with inadequate trust and pricing issues as these platforms requires an…
Abstract
Purpose
Presently, existing electric car sharing platforms are based on a centralized architecture which are faced with inadequate trust and pricing issues as these platforms requires an intermediary to maintain users’ data and handle transactions between participants. Therefore, this article aims to develop a decentralized peer-to-peer electric car sharing prototype framework that offers trustable and cost transparency.
Design/methodology/approach
This study employs a systematic review and data were collected from the literature and existing technical report documents after which content analysis is carried out to identify current problems and state-of-the-art electric car sharing. A use case scenario was then presented to preliminarily validate and show how the developed prototype framework addresses the trust-lessness in electric car sharing via distributed ledger technologies (DLTs).
Findings
Findings from this study present a use case scenario that depicts how businesses can design and implement a distributed peer-to-peer electric car sharing platforms based on IOTA technology, smart contracts and IOTA eWallet. Main findings from this study unlock the tremendous potential of DLT to foster sustainable road transportation. By employing a token-based approach this study enables electric car sharing that promotes sustainable road transportation.
Practical implications
Practically the developed decentralized prototype framework provides improved cost transparency and fairness guarantees as it is not based on a centralized price management system. The DLT based decentralized prototype framework aids to orchestrate the incentivize monetization and rewarding mechanisms among participants that share their electric cars enabling them to collaborate towards lessening CO2 emissions.
Social implications
The findings advocate that electric vehicle sharing has become an essential component of sustainable road transportation by increasing electric car utilization and decreasing the number of vehicles on the road.
Originality/value
The key novelty of the article is introducing a decentralized prototype framework to be employed to develop an electric car sharing solution without a central control or governance, which improves cost transparency. As compared to prior centralized platforms, the prototype framework employs IOTA technology smart contracts and IOTA eWallet to improve mobility related services.
Details
Keywords
Fabian Maximilian Johannes Teichmann, Chiara Wittmann and Bruno S. Sergi
The operational resilience of financial service providers is strained to an unprecedented extent following the Russian aggression in the Ukraine and the subsequent implementation…
Abstract
Purpose
The operational resilience of financial service providers is strained to an unprecedented extent following the Russian aggression in the Ukraine and the subsequent implementation of targeted economic sanctions. This paper aims to consider how operational resilience supports financial service providers in implementing sanctions.
Design/methodology/approach
The demand made of financial service providers by economic sanction is considered through the lens of operational resilience. Practical problems for the providers are aligned with economic sanctions policies.
Findings
A well-established system of operational resilience enables financial service providers to meet compliance requirements of economic sanctions with greater ease.
Originality/value
The literature does not credit operational resilience as a systemic capacity of corporations and rather presents it as a specialised feature. In addition, the role of the regulatory bodies is often dismissed despite directly inciting the practical problems faced.
Details
Keywords
Driven by the evidence from the literature on the significance of mobile (m-)payment in economic growth and productivity and at the same time the relative dismal adoption of this…
Abstract
Purpose
Driven by the evidence from the literature on the significance of mobile (m-)payment in economic growth and productivity and at the same time the relative dismal adoption of this service, the purpose of present paper is to elucidate the merchants’ m-payment adoption from the perspective of trust, drawing upon the game theory framework, in the Malaysian context.
Design/methodology/approach
An online survey consisting of 302 respondents was carried out to investigate the impact of trust and opportunism on merchants’ perceived trustworthiness using a two-staged structural equation modeling–neural network approach to determine the significance and relative importance of variables. This study also applies a game-theoretic approach to analyze the impact of trust on the relationship between merchants and m-payment service providers.
Findings
The results indicate a positive and statistically significant relationship between merchant trust, merchant opportunism and perceived trustworthiness, and a statistically significant negative relationship was found between m-payment provider opportunism and perceived trustworthiness. The findings from the prisoner’s dilemma two-player model indicate that the scenarios of mutual trust and mutual opportunism as paradigmatic of cooperation and defection produce the best and worse outcomes, respectively. An intriguing result was the positive impact of merchant opportunism on perceived trustworthiness, which indicates a very calculative orientation of merchants in m-payment contracting.
Originality/value
To the best of the authors’ knowledge, this is among the first attempts to propose a game theory approach to the interaction between merchants and m-payment providers under the framework of trust and opportunism. A game theory study in the context of m-payment adoption can contribute to the theoretical literature by providing insights into the decision-making processes of merchants. By incorporating trust and opportunism into the game theory model, we can gain a better understanding of how they affect the decision-making process and overall adoption rates. The conclusions and implications provide useful insights for managers of both m-payment platforms and merchants in this relational exchange. The results of the present research can provide insights into the factors that influence merchant decisions and guide them toward suitable partnerships for successful adoption and can guide authorities for policy interventions and supporting adoption efforts.
Details
Keywords
Anna Visvizi, Radosław Malik, Gianluca Maria Guazzo and Vilma Çekani
Against the background of the I50 paradigm, this paper queries in what ways blockchain and blockchain-based applications deployed in the smart city context facilitate the…
Abstract
Purpose
Against the background of the I50 paradigm, this paper queries in what ways blockchain and blockchain-based applications deployed in the smart city context facilitate the integration of the I50 paradigm in smart urban contexts.
Design/methodology/approach
A mixed methods approach is applied. First, by means of desk research and thematic literature review, a conceptual model integrating the I50 paradigm, smart city and blockchain-based solutions is built. Second, science mapping bibliometric analysis (SciMat) based on keywords’ co-occurrence is applied to a sample of 491 research articles to identify key domains of blockchain-based applications’ use in smart city. Third, a semi-systematic literature review complements insights gained through SciMat. Fourth, the findings are interpreted through the precepts of the conceptual model devised earlier.
Findings
The key blockchain-based applications in smart cities pertain to two domains, i.e. the foundational, service facilitation-oriented domain, including security (and safety), networks, computing, resource management and the service delivery-oriented domain, including mobility, energy and healthcare. Blockchain serves as the key building block for applications developed to deliver functions specific to each of the thus identified domains. A substantial layering of blockchain-based tools and applications is necessary to advance from the less to the more complex functional domains of the smart city.
Originality/value
At the conceptual level, the intricacies of the (making of the) I50 paradigm are discussed and a case for I50 – smart city – blockchain nexus is made. Easton’s input–output model as well as constructivism is referenced. At the empirical level, the key major domains of blockchain-based applications are discussed; those that bear the prospect of integrating the I50 paradigm in the smart city are highlighted. At the methodological level, a strategic move is made aimed at restoring the literature review’s role as subservient to the key line of exploration, to justify and ultimately support it, rather than to showcase the literature review as the ultimate purpose for itself.
Details