Search results

1 – 10 of 165
Article
Publication date: 9 April 2024

Iftikhar Ahmad, Salim Khan and Shahid Iqbal

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…

Abstract

Purpose

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.

Design/methodology/approach

In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.

Findings

The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.

Research limitations/implications

This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.

Practical implications

This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.

Social implications

This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.

Originality/value

This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 29 December 2022

K.V. Sheelavathy and V. Udaya Rani

Internet of Things (IoT) is a network, which provides the connection with various physical objects such as smart machines, smart home appliance and so on. The physical objects are…

Abstract

Purpose

Internet of Things (IoT) is a network, which provides the connection with various physical objects such as smart machines, smart home appliance and so on. The physical objects are allocated with a unique internet address, namely, Internet Protocol, which is used to perform the data broadcasting with the external objects using the internet. The sudden increment in the number of attacks generated by intruders, causes security-related problems in IoT devices while performing the communication. The main purpose of this paper is to develop an effective attack detection to enhance the robustness against the attackers in IoT.

Design/methodology/approach

In this research, the lasso regression algorithm is proposed along with ensemble classifier for identifying the IoT attacks. The lasso algorithm is used for the process of feature selection that modeled fewer parameters for the sparse models. The type of regression is analyzed for showing higher levels when certain parts of model selection is needed for parameter elimination. The lasso regression obtains the subset for predictors to lower the prediction error with respect to the quantitative response variable. The lasso does not impose a constraint for modeling the parameters caused the coefficients with some variables shrink as zero. The selected features are classified by using an ensemble classifier, that is important for linear and nonlinear types of data in the dataset, and the models are combined for handling these data types.

Findings

The lasso regression with ensemble classifier–based attack classification comprises distributed denial-of-service and Mirai botnet attacks which achieved an improved accuracy of 99.981% than the conventional deep neural network (DNN) methods.

Originality/value

Here, an efficient lasso regression algorithm is developed for extracting the features to perform the network anomaly detection using ensemble classifier.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 26 May 2023

Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…

Abstract

Purpose

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.

Design/methodology/approach

For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.

Findings

The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.

Originality/value

Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 3 October 2023

Jayaprada Putrevu and Charilaos Mertzanis

This paper aims to present a comprehensive overview of the emergence and significance of digital payments, focusing on their impact on competitiveness and the need for policy…

Abstract

Purpose

This paper aims to present a comprehensive overview of the emergence and significance of digital payments, focusing on their impact on competitiveness and the need for policy interventions. In addition, it explores the design of policies that promote the adoption of digital payments, highlighting the benefits they offer to providers and users.

Design/methodology/approach

The paper examines the technological advances that have driven the growth of digital payment systems. It identifies key requirements for successful adoption and discusses the associated risks, along with potential strategies to mitigate these risks.

Findings

The findings emphasize the importance of responsible implementation and safeguarding the well-being of end users to fully realize the benefits of digital payment adoption. Understanding the inherent risks and establishing effective risk mitigation mechanisms are crucial. This necessitates the development of appropriate infrastructure to support the provision of digital payment services.

Research limitations/implications

More research is needed to gain deeper insights into how emerging global trends in financial technology should be analyzed and understood by policymakers, service providers and users.

Practical implications

The findings of this study can guide policymakers, private sector managers and consumers in comprehending the effects of emerging digitalization trends and determining their adoption responses accordingly.

Originality/value

This paper stands out as one of the few research contributions that provide comprehensive and actionable policy recommendations to facilitate a smooth transition to a digital payments ecosystem that benefits all stakeholders.

Details

Digital Policy, Regulation and Governance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 26 March 2024

Dilek Şahin, Mehmet Nurullah Kurutkan and Tuba Arslan

Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services…

Abstract

Purpose

Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services received, whether public or private. The use of the application by patients and physicians has provided efficiency and cost advantages. The success of e-Nabız depends on the level of technology acceptance of health-care service providers and recipients. While there is a large research literature on the technology acceptance of service recipients in health-care services, there is a limited number of studies on physicians providing services. This study aims to determine the level of influence of trust and privacy variables in addition to performance expectancy, effort expectancy, social influence and facilitating factors in the unified theory of acceptance and use of technology (UTAUT) model on the intention and behavior of using e-Nabız application.

Design/methodology/approach

The population of the study consisted of general practitioners and specialist physicians actively working in any health facility in Turkey. Data were collected cross-sectionally from 236 physicians on a voluntary basis through a questionnaire. The response rate of data collection was calculated as 47.20%. Data were collected cross-sectionally from 236 physicians through a questionnaire. Descriptive statistics, correlation analysis and structural equation modeling were used to analyze the data.

Findings

The study found that performance expectancy, effort expectancy, trust and perceived privacy had a significant effect on physicians’ behavioral intentions to adopt the e-Nabız system. In addition, facilitating conditions and behavioral intention were determinants of usage behavior (p < 0.05). However, no significant relationship was found between social influence and behavioral intention (p > 0.05).

Originality/value

This study confirms that the UTAUT model provides an appropriate framework for predicting factors influencing physicians’ behaviors and intention to use e-Nabız. In addition, the empirical findings show that trust and perceived privacy, which are additionally considered in the model, are also influential.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 15 February 2024

Bokolo Anthony Jnr

Presently, existing electric car sharing platforms are based on a centralized architecture which are faced with inadequate trust and pricing issues as these platforms requires an…

Abstract

Purpose

Presently, existing electric car sharing platforms are based on a centralized architecture which are faced with inadequate trust and pricing issues as these platforms requires an intermediary to maintain users’ data and handle transactions between participants. Therefore, this article aims to develop a decentralized peer-to-peer electric car sharing prototype framework that offers trustable and cost transparency.

Design/methodology/approach

This study employs a systematic review and data were collected from the literature and existing technical report documents after which content analysis is carried out to identify current problems and state-of-the-art electric car sharing. A use case scenario was then presented to preliminarily validate and show how the developed prototype framework addresses the trust-lessness in electric car sharing via distributed ledger technologies (DLTs).

Findings

Findings from this study present a use case scenario that depicts how businesses can design and implement a distributed peer-to-peer electric car sharing platforms based on IOTA technology, smart contracts and IOTA eWallet. Main findings from this study unlock the tremendous potential of DLT to foster sustainable road transportation. By employing a token-based approach this study enables electric car sharing that promotes sustainable road transportation.

Practical implications

Practically the developed decentralized prototype framework provides improved cost transparency and fairness guarantees as it is not based on a centralized price management system. The DLT based decentralized prototype framework aids to orchestrate the incentivize monetization and rewarding mechanisms among participants that share their electric cars enabling them to collaborate towards lessening CO2 emissions.

Social implications

The findings advocate that electric vehicle sharing has become an essential component of sustainable road transportation by increasing electric car utilization and decreasing the number of vehicles on the road.

Originality/value

The key novelty of the article is introducing a decentralized prototype framework to be employed to develop an electric car sharing solution without a central control or governance, which improves cost transparency. As compared to prior centralized platforms, the prototype framework employs IOTA technology smart contracts and IOTA eWallet to improve mobility related services.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 28 September 2023

Fabian Maximilian Johannes Teichmann, Chiara Wittmann and Bruno S. Sergi

The operational resilience of financial service providers is strained to an unprecedented extent following the Russian aggression in the Ukraine and the subsequent implementation…

Abstract

Purpose

The operational resilience of financial service providers is strained to an unprecedented extent following the Russian aggression in the Ukraine and the subsequent implementation of targeted economic sanctions. This paper aims to consider how operational resilience supports financial service providers in implementing sanctions.

Design/methodology/approach

The demand made of financial service providers by economic sanction is considered through the lens of operational resilience. Practical problems for the providers are aligned with economic sanctions policies.

Findings

A well-established system of operational resilience enables financial service providers to meet compliance requirements of economic sanctions with greater ease.

Originality/value

The literature does not credit operational resilience as a systemic capacity of corporations and rather presents it as a specialised feature. In addition, the role of the regulatory bodies is often dismissed despite directly inciting the practical problems faced.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 15 August 2023

Babak Naysary

Driven by the evidence from the literature on the significance of mobile (m-)payment in economic growth and productivity and at the same time the relative dismal adoption of this…

Abstract

Purpose

Driven by the evidence from the literature on the significance of mobile (m-)payment in economic growth and productivity and at the same time the relative dismal adoption of this service, the purpose of present paper is to elucidate the merchants’ m-payment adoption from the perspective of trust, drawing upon the game theory framework, in the Malaysian context.

Design/methodology/approach

An online survey consisting of 302 respondents was carried out to investigate the impact of trust and opportunism on merchants’ perceived trustworthiness using a two-staged structural equation modeling–neural network approach to determine the significance and relative importance of variables. This study also applies a game-theoretic approach to analyze the impact of trust on the relationship between merchants and m-payment service providers.

Findings

The results indicate a positive and statistically significant relationship between merchant trust, merchant opportunism and perceived trustworthiness, and a statistically significant negative relationship was found between m-payment provider opportunism and perceived trustworthiness. The findings from the prisoner’s dilemma two-player model indicate that the scenarios of mutual trust and mutual opportunism as paradigmatic of cooperation and defection produce the best and worse outcomes, respectively. An intriguing result was the positive impact of merchant opportunism on perceived trustworthiness, which indicates a very calculative orientation of merchants in m-payment contracting.

Originality/value

To the best of the authors’ knowledge, this is among the first attempts to propose a game theory approach to the interaction between merchants and m-payment providers under the framework of trust and opportunism. A game theory study in the context of m-payment adoption can contribute to the theoretical literature by providing insights into the decision-making processes of merchants. By incorporating trust and opportunism into the game theory model, we can gain a better understanding of how they affect the decision-making process and overall adoption rates. The conclusions and implications provide useful insights for managers of both m-payment platforms and merchants in this relational exchange. The results of the present research can provide insights into the factors that influence merchant decisions and guide them toward suitable partnerships for successful adoption and can guide authorities for policy interventions and supporting adoption efforts.

Details

Competitiveness Review: An International Business Journal , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1059-5422

Keywords

Article
Publication date: 10 April 2024

Anna Visvizi, Radosław Malik, Gianluca Maria Guazzo and Vilma Çekani

Against the background of the I50 paradigm, this paper queries in what ways blockchain and blockchain-based applications deployed in the smart city context facilitate the…

32

Abstract

Purpose

Against the background of the I50 paradigm, this paper queries in what ways blockchain and blockchain-based applications deployed in the smart city context facilitate the integration of the I50 paradigm in smart urban contexts.

Design/methodology/approach

A mixed methods approach is applied. First, by means of desk research and thematic literature review, a conceptual model integrating the I50 paradigm, smart city and blockchain-based solutions is built. Second, science mapping bibliometric analysis (SciMat) based on keywords’ co-occurrence is applied to a sample of 491 research articles to identify key domains of blockchain-based applications’ use in smart city. Third, a semi-systematic literature review complements insights gained through SciMat. Fourth, the findings are interpreted through the precepts of the conceptual model devised earlier.

Findings

The key blockchain-based applications in smart cities pertain to two domains, i.e. the foundational, service facilitation-oriented domain, including security (and safety), networks, computing, resource management and the service delivery-oriented domain, including mobility, energy and healthcare. Blockchain serves as the key building block for applications developed to deliver functions specific to each of the thus identified domains. A substantial layering of blockchain-based tools and applications is necessary to advance from the less to the more complex functional domains of the smart city.

Originality/value

At the conceptual level, the intricacies of the (making of the) I50 paradigm are discussed and a case for I50 – smart city – blockchain nexus is made. Easton’s input–output model as well as constructivism is referenced. At the empirical level, the key major domains of blockchain-based applications are discussed; those that bear the prospect of integrating the I50 paradigm in the smart city are highlighted. At the methodological level, a strategic move is made aimed at restoring the literature review’s role as subservient to the key line of exploration, to justify and ultimately support it, rather than to showcase the literature review as the ultimate purpose for itself.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

1 – 10 of 165