Access the full text.
Sign up today, get DeepDyve free for 14 days.
Jurnal Ekonomi Dan Keuangan, 6
Soheil Kazemian, Jamaliah Said, Elham Nia, H. Vakilifard (2019)
Examining fraud risk factors on asset misappropriation: evidence from the Iranian banking industryJournal of Financial Crime
Ashu Khanna, B. Arora (2009)
A study to investigate the reasons for bank frauds and the implementation of preventive security controls in Indian banking industry, 4
Juan Fuertes-Martínez, M. Domínguez-González, Perfecto Reguera-Acevedo, M. Prada, Ignacio Blanco, A. Vega (2010)
Visual dynamic model based on self-organizing maps for supervision and fault detection in industrial processesEng. Appl. Artif. Intell., 23
J. Lindsay (2017)
Restrained by design: the political economy of cybersecurity, 19
T. Nguyen, H. Pontell (2010)
Mortgage origination fraud and the global economic crisis: A criminological analysisCriminology and public policy, 9
S. Lewis, C. Cooper, K. Cooper, P. Bonner, K. Parker, A. Frauman (1999)
Research priorities for nephrology nursing: American Nephrology Nurses' Association's Delphi Study.ANNA journal, 26 2
M. Abedin, Md. Dawan (2016)
A Panel Data Analysis for Evaluating the Profitability of the Banking Sector in Bangladesh, 3
S. Manacorda, Costantino Grasso (2018)
Fighting Fraud and Corruption at the World Bank: A Critical Analysis of the Sanctions System
K. Ma, T. McKinnon (2020)
COVID-19 and cyber fraud: emerging threats during the pandemicJournal of Financial Crime
Douglas Boyle, James Boyle, Daniel Mahoney (2018)
Behavioral Assessment and Modification in Fraud Mitigation EffortsManagement Accounting Quarterly, 20
M. Bhasin (2016)
The Role Of Technology In Combatting Bank Frauds: Perspectives And ProspectsEcoforum, 5
J. Winter, E. Davidson (2019)
Governance of artificial intelligence and personal health informationDigital Policy, Regulation and Governance
An International Multi-Disciplinary Journal, 4
S. Perveen, Kamruzzaman, Tan Yigitcanlar (2017)
Developing policy scenarios for sustainable urban growth management: A Delphi approach
Zhoulin Li, Hao Zhang, Mohammad Masum, H. Shahriar, Hisham Haddad (2020)
Cyber Fraud Prediction with Supervised Machine Learning TechniquesProceedings of the 2020 ACM Southeast Conference
Ioannis Koskosas (2011)
E-banking security: A communication perspectiveRisk Management, 13
British Journal of Arts and Social Sciences, 15
O. Kuzmenko, T. Dotsenko, L. Skrynka (2021)
Economic and Mathematical Modelling of the Effectiveness of the National System for Combatting Cyber Fraud and Legalisation of Criminal Proceeds Based on Survival Analysis Methods, 8
E. Leukfeldt, M. Yar (2016)
Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical AnalysisDeviant Behavior, 37
Philmore Alleyne, Nadini Persaud, Peter Alleyne, Dion Greenidge, Peter Sealy (2010)
Perceived effectiveness of fraud detection audit procedures in a stock and warehousing cycleManagerial Auditing Journal, 25
Geoff Watson (2002)
E-mail surveillance in the UK workplace - a management consulting case studyAslib Proc., 54
J. Lennox, G. Turner, Csiro. Ecosystems. (2005)
State of the Environment Report on Human Settlements: Stocks and Flows Indicators
N. Roy, N. Vamsi, N. Rao (2015)
An Appraisal and Forecasting of NPAs in Indian Banking IndustryAl-Barkaat Journal of Finance & Management, 7
M. Abdullah, S. Shahimi, A. Ismail (2011)
Operational risk in Islamic banks: examination of issuesQualitative Research in Financial Markets, 3
Susan Haugen, J. Selin (1999)
Identifying and controlling computer crime and employee fraudIndustrial Management and Data Systems, 99
Anisa Hidayati, I. Riadi, E. Ramadhani, Sarah Amany (2021)
Development of conceptual framework for cyber fraud investigation, 7
(2021)
Can a whistleblowing policy help prevent fraud and strengthen cyber security?
(2020)
Computers & security a review and theoretical explanation of the ‘cyberthreat-intelligence (CTI) capability
Yungchang Ku, Yuchi Chen, C. Chiu (2007)
A Proposed Data Mining Approach for Internet Auction Fraud Detection
Nicole Andreoli, J. Lefkowitz (2009)
Individual and Organizational Antecedents of Misconduct in OrganizationsJournal of Business Ethics, 85
V. Balakrishnan, Shahzaib Khan, H. Arabnia (2020)
Improving cyberbullying detection using Twitter users' psychological features and machine learningComput. Secur., 90
Rayne Reid, J. Niekerk (2014)
From information security to cyber security cultures2014 Information Security for South Africa
M. Ferracane (2019)
Data flows and national security: a conceptual framework to assess restrictions on data flows under GATS security exceptionDigital Policy, Regulation and Governance
I. Gheyas, A. Abdallah (2016)
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysisBig Data Analytics, 1
Asher Blass, R. Grossman (1996)
Financial fraud and banking stability: The Israeli bank crisis of 1983 and trial of 1990International Review of Law and Economics, 16
Zuraidah Mohd-Sanusi, Norhayati Mohamed, Normah Omar, Mohd-Daniel Mohd-Nassir (2015)
Effects of Internal Controls, Fraud Motives and Experience in Assessing Likelihood of Fraud RiskJournal of Economics, Business and Management, 3
João Serrado, R. Pereira, M. Silva, I. Bianchi (2020)
Information security frameworks for assisting GDPR compliance in banking industryDigital Policy, Regulation and Governance
(2017)
Fraud risk management in banks: the do’s and don’ts
P. Murphy, M. Dacin (2011)
Psychological Pathways to Fraud: Understanding and Preventing Fraud in OrganizationsJournal of Business Ethics, 101
D. Resnik, Peter Finn (2017)
Ethics and Phishing ExperimentsScience and Engineering Ethics, 24
M. Zeleňáková, L. Zvijáková, P. Purcz (2013)
Small Hydropower Plant – Environmental Impact Assessment – Case Study
Vinicius Almendra (2013)
Finding the needle: A risk-based ranking of product listings at online auction sites for non-delivery fraud predictionExpert Syst. Appl., 40
R. Dodge, C. Carver, A. Ferguson (2007)
Phishing for user security awarenessComput. Secur., 26
Kurt Thomas, Damon McCoy, Chris Grier, A. Kolcz, V. Paxson (2013)
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse
Shing-Han Li, D. Yen, Wen-Hui Lu, Chi-Jer Wang (2012)
Identifying the signs of fraudulent accounts using data mining techniquesComput. Hum. Behav., 28
(2016)
A criminological profile
M. Beasley, Joseph Carcello, D. Hermanson, Paul Lapides (2000)
Fraudulent Financial Reporting: Consideration of Industry Traits and Corporate Governance MechanismsAccounting Horizons, 14
Rohit Bansal, Arunabh Singh, Sushil Kumar, Rajni Gupta (2018)
Evaluating factors of profitability for Indian banking sector: a panel regressionAsian Journal of Accounting Research
European Journal of Operational Research, 247
N. Roy, Sankarshan Basu (2021)
Bank’s battle against insider frauds ignitors and mitigators: an emerging nation experienceJournal of Facilities Management
H. Lallie, Lynsay Shepherd, Jason Nurse, Arnau Erola, G. Epiphaniou, C. Maple, X. Bellekens (2020)
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemicComputers & Security, 105
Tan Yigitcanlar, Didem Dizdaroglu (2014)
Ecological approaches in planning for sustainable cities: A review of the literatureGlobal Journal of Environmental Science and Management, 1
D. Dimitrijevic, V. Milovanović, Vladimir Stančić (2015)
The Role of A Company’s Internal Control System in Fraud Preventione-Finanse, 11
T. Sommestad, Henrik Karlzén, J. Hallberg (2015)
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security BehaviourInt. J. Inf. Secur. Priv., 9
A. Marazzi, A. Villar, V. Yohai (2009)
Robust Response Transformations Based on Optimal PredictionJournal of the American Statistical Association, 104
N. Kshetri (2005)
Pattern of Global Cyber War and Crime: A Conceptual FrameworkBehavioral & Experimental Economics
M. Maybury, P. Chase, B. Cheikes, Dick Brackney, Sara Matzner, B. Wood, T. Longstaff, Tom Hetherington, Jack Marin, L. Spitzner, J. Copeland, S. Lewandowski, Jedediah Haile (2005)
Analysis and Detection of Malicious Insiders
N. Kshetri (2016)
Cybercrime and cybersecurity in India: causes, consequences and implications for the futureCrime, Law and Social Change, 66
Hyoung-Kil Park, Jong Kim (2020)
Transition towards green banking: role of financial regulators and financial institutionsAsian Journal of Sustainability and Social Responsibility, 5
J. Braithwaite (2010)
Diagnostics of white-collar crime preventionCriminology and public policy, 9
Marijn Martens, R. Wolf, L. Marez (2019)
Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in generalComput. Hum. Behav., 92
M. Melecký, A. Podpiera (2010)
Macroprudential Stress-Testing Practices of Central Banks in Central and Southeastern Europe: Comparison and Challenges AheadEmerging Markets Finance and Trade, 48
C. Olaoye, D. Adekola (2014)
Analysis Of Frauds In Banks: Nigeria’s ExperienceEuropean Journal of Business and Management, 6
Marta Dischinger, J. Jackson (2006)
Which future urban scenarios can we constructManagement of Environmental Quality: An International Journal, 17
Xingan Li, M. Juhola (2014)
Application of the self-organising map to visualisation of and exploration into historical development of criminal phenomena in the USA, 1960-2007International Journal of Society Systems Science, 6
K. Mccrohan, K. Engel, J. Harvey (2010)
Influence of Awareness and Training on Cyber SecurityJournal of Internet Commerce, 9
R. Rahman, K. Abdul, S. Arabia, S. Sulaiman, Eiman Fadel, Soheil Kazemian (2016)
Earnings Management and Fraudulent Financial Reporting: The Malaysian StoryJournal of modern accounting and auditing, 12
(2018)
Fraud in Nigerian banking sector an evaluation of the effect of external debt on economic growth indices in Nigeria view project
(2017)
Energy issues in India and South Africa
Neil Fligstein, Alexander Roehrkasse (2016)
The Causes of Fraud in the Financial Crisis of 2007 to 2009American Sociological Review, 81
(2019)
Global banking fraud survey-the multi-faceted threat of fraud: are banks up to the challenge?
Patrick Behr, R. Schmidt, Ru Xie (2010)
Market Structure, Capital Regulation and Bank Risk TakingJournal of Financial Services Research, 37
(2017)
Innovations in financial inclusion: an evening with the CEO working group
Deepa Mangala, P. Kumari (2017)
Auditors’ Perceptions of the Effectiveness of Fraud Prevention and Detection MethodsIndian Journal of Corporate Governance, 10
L. Nawaf, C. Hewage, Fiona Carroll (2021)
Minimization of Cyber Security Threats Caused by COVID-19 Pandemic
(2013)
A.B.C.'s of Behavioral Forensics
Shabnam Aghghaleh, Z. Mohamed (2014)
Fraud Risk Factors of Fraud Triangle and the Likelihood of Fraud Occurrence: Evidence from MalaysiaInformation Management and Business Review, 6
Z. Sanusi, Mohd Rameli, Yusarina Isa (2015)
Fraud Schemes in the Banking Institutions: Prevention Measures to Avoid Severe Financial LossProcedia. Economics and finance, 28
Douglas Ziegenfuss (1996)
State and local government fraud survey for 1995Managerial Auditing Journal, 11
D. Farrugia, Christopher Zerafa, Tony Cini, Bruno Kuasney, Karen Livori (2021)
A Real-Time Prescriptive Solution for Explainable Cyber-Fraud Detection Within the iGaming IndustrySn Computer Science, 2
B. Harrison, W. Moore (2012)
Forecasting Stock Market Volatility in Central and Eastern European CountriesJournal of Forecasting, 31
Carolyn Holton (2009)
Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problemDecis. Support Syst., 46
B. Baesens, Sebastiaan Höppner, Tim Verdonck (2021)
Data engineering for fraud detectionDecis. Support Syst., 150
A. Çetinkaya, A. Damar (2019)
PSYCHOLOGICAL RESILIENCE ON CAREER ANCHORSSosyal Ekonomik Araştırmalar Dergisi
Ali Bendob (2015)
Profitability of Public and Private Commercial Banks in Algeria: Panel data analysis during 1997-2012European Journal of Business and Management, 7
Malvika Singh, B. Mehtre, S. Sangeetha (2022)
User behavior based Insider Threat Detection using a Multi Fuzzy ClassifierMultimedia Tools and Applications, 81
Jamaliah Said, N. Omar, Marhamah Rafidi, Sharifah Yusof (2018)
Are organizational factors more prevailing than individual factors in mitigating employee fraud?Journal of Financial Crime
M. Ralph, B. Harvey, B. Lewis (2000)
Report from the field: A new generation of geothermal turbine-generator plants for baseload utility service
M. Bhasin (2016)
Challenge of mitigating bank frauds by judicious mix of technology: experience of a developing country, 1
N. Roy (2020)
Banks and their technology investment decision are aligned or not – an experience of Indian banksJournal of Facilities Management
Julian Jang, S. Nepal (2014)
A survey of emerging threats in cybersecurityJ. Comput. Syst. Sci., 80
Kari Einarsen, L. Jack (2019)
Collective action and UK wine investment fraudQualitative Research in Financial Markets
A. Donnelly, MICHAEL Jones, Tadhg O’Mahony, G. Byrne (2007)
Selecting environmental indicator for use in strategic environmental assessmentEnvironmental Impact Assessment Review, 27
S. Pokharel (2019)
Impact of liquidity on profitability in Nepalese Commercial BankPatan Pragya
David Haynes, L. Robinson (2015)
Defining user risk in social networking servicesAslib J. Inf. Manag., 67
P. Gupta, S. Gupta (2015)
Corporate frauds in India – perceptions and emerging issuesJournal of Financial Crime, 22
(2021)
4 biggest cyber security threats for Indian banking sector
A. Reurink (2018)
Financial Fraud: A Literature ReviewConsumer Financial Fraud eJournal
Journal of Accountancy, 182
Yanjun Qi, Z. Bar-Joseph, J. Klein-Seetharaman (2006)
Evaluation of different biological data and computational classification methods for use in protein interaction predictionProteins: Structure, 63
K. Hassan, Nawfal Jabur, M. Nia (2021)
E-COMMERCE IN THE PANDEMIC AND BEYONDInternauka
Suraya Tamrin, A. Norman, S. Hamid (2017)
Information systems security practices in social software applications: A systematic literature reviewAslib J. Inf. Manag., 69
C. Strobl, J. Malley, G. Tutz (2009)
An introduction to recursive partitioning: rationale, application, and characteristics of classification and regression trees, bagging, and random forests.Psychological methods, 14 4
(2016)
Cyber security management: a review
Huidong Jin, Wing-Ho Shum, K. Leung, M. Wong (2004)
Expanding Self-Organizing Map for data visualization and cluster analysisInf. Sci., 163
E. Inkoom, R. Leiringer (2016)
Governance units as interstitial organizations: the role of governance organizations in the development and establishment of Building Environmental Assessment Methods (BEAM)
E. Carrizosa, Cristina Molero-Río, Dolores Morales (2021)
Mathematical optimization in classification and regression treesTOP, 29
Transnational Financial Crime, 9
Antje Hargarter, G. Vuuren (2019)
Measuring conduct risk in South African banksQualitative Research in Financial Markets
Jinghai Zheng (2017)
Financial History, Insurance Fraud, Armington Substitution Elasticity, and Aggregate Saving in ChinaEmerging Markets Finance and Trade, 53
A. Pearman (1988)
Scenario construction for transport planningTransportation Planning and Technology, 12
T. Ahram, A. Sargolzaei, S. Sargolzaei, Jeff Daniels, Ben Amaba (2017)
Blockchain technology innovations2017 IEEE Technology & Engineering Management Conference (TEMSCON)
Neda Halvaiee, M. Akbari (2014)
A novel model for credit card fraud detection using Artificial Immune SystemsAppl. Soft Comput., 24
Journal of Academic Research in Business and Social Sciences, 3
Kenza Belhouchette, M. Berkane, H. Belhadef (2019)
Interest emotion recognition approach using self-organising map and motion estimationInt. J. Intell. Syst. Technol. Appl., 18
H. Khrawish (2011)
The Impact of E-Banking on Bank Profitability : Evidence from Jordan
M. Machado, I. Gartner (2017)
A hipótese de Cressey (1953) e a investigação da ocorrência de fraudes corporativas: uma análise empírica em instituições bancárias brasileirasRevista Contabilidade & Finanças, 29
J. Bierstaker, R. Brody, Carl Pacini (2006)
Accountants' perceptions regarding fraud detection and prevention methodsManagerial Auditing Journal, 21
M. Garcia, João Guerreiro (2016)
Internal and external determinants of banks’ profitabilityJournal of Economic Studies, 43
E. Ngai, Yong Hu, Y. Wong, Yijun Chen, Xin Sun (2011)
The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literatureDecis. Support Syst., 50
R. Rahman, I. Anwar (2014)
Effectiveness of Fraud Prevention and Detection Techniques in Malaysian Islamic BanksProcedia - Social and Behavioral Sciences, 145
International Journal of Intelligent Systems Technologies and Applications, 18
I. Isik (2007)
Bank ownership and productivity developments: evidence from TurkeyStudies in Economics and Finance, 24
(2012)
The password fallacy: why our security system is broken, and how to fix it
M. Horenbeeck (2018)
The future of Internet governance and cyber-securityComputer Fraud & Security, 2018
W. Easterly, Ross Levine (1997)
Africa's Growth Tragedy: Policies and Ethnic DivisionsQuarterly Journal of Economics, 112
Nephrology Nursing Journal, 26
C. Nee, Mark Button, David Shepherd, D. Blackbourn, Sharon Leal (2019)
The psychology of the corrupt: some preliminary findingsJournal of Financial Crime
Amanda Cowen, J. Marcel (2011)
Damaged Goods: Board Decisions to Dismiss Reputationally Compromised DirectorsAcademy of Management Journal, 54
D. Sharma (2012)
Does Technology Lead to Better Financial Performance? A Study of Indian Commercial BanksManaging global transitions, 10
C. Harries (2003)
Correspondence to what? Coherence to what? What is good scenario-based decision making?Technological Forecasting and Social Change, 70
Benjamin Walker, C. Jackson (2017)
Moral Emotions and Corporate Psychopathy: A ReviewJournal of Business Ethics, 141
European Journal of Business and Management, 7
D. Jorgenson, K. Stiroh (2000)
Raising the Speed Limit: U.S. Economic Growth in the Information AgeBrookings Papers on Economic Activity, 2000
BIS Bulletins
M. Najafabadi, Flavio Villanustre, T. Khoshgoftaar, Naeem Seliya, Randall Wald, Edin Muharemagic (2015)
Deep learning applications and challenges in big data analyticsJournal of Big Data, 2
M. Feily, A. Shahrestani, S. Ramadass (2009)
A Survey of Botnet and Botnet Detection2009 Third International Conference on Emerging Security Information, Systems and Technologies
N. Roy, T. Vishwanathan (2018)
Workforce Challenges in Indian Banking Scenario – Journey from Identification Till MitigationCurrent Science
Siqi Chen, Yufei Yuan, X. Luo, Jie Jian, Yan Wang (2021)
Discovering group-based transnational cyber fraud actives: A polymethodological viewComput. Secur., 104
Petrov Oana, Shahumyan Harutyun, Williams Brendan, Convery Sheila (2011)
Scenarios and Indicators Supporting Urban Regional PlanningProcedia - Social and Behavioral Sciences, 21
(2019)
10 Cases of insider bank attacks
G. Irianto, Nurlita Novianti, Kristin Rosalina, Yuki Firmanto (2012)
INTEGRITY, UNETHICAL BEHAVIOR, AND TENDENCY OF FRAUDEKUITAS (Jurnal Ekonomi dan Keuangan)
Rick Brown (2017)
Vehicle crime prevention and the co-evolutionary arms race: recent offender countermoves using immobiliser bypass technologySecurity Journal, 30
(2011)
Innovative technologies in credit card fraud detection: a centralized approach
Erika Parn, D. Edwards (2019)
Cyber threats confronting the digital built environmentEngineering, Construction and Architectural Management
S. Batten, R. Sowerbutts, Misa Tanaka (2016)
Let's Talk About the Weather: The Impact of Climate Change on Central BanksSRPN: Carbon Reduction (Topic)
Tracy Coenen (2012)
Fraud Detection and Investigation
A. Hoffmann, Cornelia Birnbrich (2012)
The impact of fraud prevention on bank-customer relationships: an empirical investigation in retail bankingInternational Journal of Bank Marketing, 30
Nik Thompson, T. McGill, Xuequn Wang (2017)
"Security begins at home": Determinants of home computer and mobile device security behaviorComput. Secur., 70
Rania Abdel-Galil (2012)
Desert reclamation, a management system for sustainable urban expansionProgress in Planning, 78
(2010)
Fortify your online defences
O. Evans (2018)
Connecting the poor: the internet, mobile phones and financial inclusion in AfricaDigital Policy, Regulation and Governance
S. Owolabi (2010)
Fraud and Fraudulent Practices in Nigeria Banking IndustryAfrican Research Review, 4
Nishant Agarwal, Meghna Sharma (2014)
Fraud Risk Prediction in Merchant-Bank Relationship using Regression ModelingVikalpa: The Journal for Decision Makers, 39
D. Gilmour, D. Blackwood, Les Banks, Fergus Wilson (2011)
Sustainable development indicators for major infrastructure projects, 164
(2019)
Factors and motivation of fraud in the corporate sector: a literature review
J. Akkeren, Sherrena Buckby (2017)
Perceptions on the Causes of Individual and Fraudulent Co-offending: Views of Forensic AccountantsJournal of Business Ethics, 146
E. Okoye, D. Gbegi (2013)
Forensic Accounting: A Tool for Fraud Detection and Prevention in the Public Sector. (A Study of Selected Ministries in Kogi State)Forensic Economics eJournal
Michiaki Taniguchi, M. Haft, Jaakko Hollmén, Volker Tresp (1998)
Fraud detection in communication networks using neural and probabilistic methodsProceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181), 2
Danish Vasan, M. Alazab, Sobia Wassan, B. Safaei, Zheng Qin (2020)
Image-Based malware classification using ensemble of CNN architectures (IMCEC)Comput. Secur., 92
Jacqueline Drew, Lucy Farrell (2018)
Online victimization risk and self-protective strategies: developing police-led cyber fraud prevention programsPolice Practice and Research, 19
George Bongomin, Joseph Ntayi (2020)
Mobile money adoption and usage and financial inclusion: mediating effect of digital consumer protection, 22
Won Kim, O. Jeong, Chulyun Kim, Jungmin So (2011)
The dark side of the Internet: Attacks, costs and responsesInf. Syst., 36
N. Roy, Viswanathan Thangaraj (2020)
Investment in Technology: Does It Proliferate the Profitability and Performance of the Indian Banks?
W. Albrecht, Chad Albrecht, Conan Albrecht (2008)
Current Trends in Fraud and its DetectionInformation Security Journal: A Global Perspective, 17
Heba Adel, Mostafa ElBakary, K. Eldahshan, D. Salah (2021)
BC-HRM: A Blockchain-Based Human Resource Management System Utilizing Smart Contracts
B. Baesens, T. Gestel, Stijn Viaene, M. Stepanova, J. Suykens, J. Vanthienen (2003)
Benchmarking state-of-the-art classification algorithms for credit scoringJournal of the Operational Research Society, 54
S. Bansal (2015)
The impact of technology on the performance of Indian banking industry: an empirical study
H. Pontell (2005)
White-collar crime or just risky business? The role of fraud in major financial debaclesCrime, Law and Social Change, 42
(2019)
Banking report: global vision
M. Bach, Nikola Vlahovic, Jasmina Pivar (2020)
Fraud Prevention in the Leasing Industry Using the Kohonen Self-Organising MapsOrganizacija, 53
Antonio Clim (2019)
Cyber Security Beyond the Industry 4.0 Era. A Short Review on a Few Technological PromisesInformatica Economica
Neha Roy, Sreeleakha Prabhakaran (2022)
Sustainable response system building against insider-led cyber frauds in banking sector: a machine learning approachJournal of Financial Crime
J. Abawajy (2014)
User preference of cyber security awareness delivery methodsBehaviour & Information Technology, 33
(2021)
Sustainable banking and finance network
American Society of Criminology, 9
Z. Vakhitova, C. Alston-Knox, D. Reynald, M. Townsley, Julianne Webster (2019)
Lifestyles and routine activities: Do they enable different types of cyber abuse?Comput. Hum. Behav., 101
M. Touri (2009)
News blogs: strengthening democracy through conflict preventionAslib Proc., 61
E. Shaw (2006)
The role of behavioral research and profiling in malicious cyber insider investigationsDigit. Investig., 3
Andy Liaw, M. Wiener (2007)
Classification and Regression by randomForest
The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian banks. The authors attempted to identify and classify cyber frauds and its drivers and correlate them for optimal mitigation planning.Design/methodology/approachThe methodology opted for the identification and classification is through a detailed literature review and focus group discussion with risk and vigilance officers and cyber cell experts. The authors assessed the future of cyber fraud in the Indian banking business through the machine learning–based k-nearest neighbor (K-NN) approach and prioritized and predicted the future of cyber fraud. The predicted future revealing dominance of a few specific cyber frauds will help to get an appropriate fraud prevention model, using an associated parties centric (victim and offender) root-cause approach. The study uses correlation analysis and maps frauds with their respective drivers to determine the resource specific effective mitigation plan.FindingsFinally, the paper concludes with a conceptual framework for preventing internal-led cyber fraud within the scope of the study. A cyber fraud mitigation ecosystem will be helpful for policymakers and fraud investigation officers to create a more robust environment for banks through timely and quick detection of cyber frauds and prevention of them.Research limitations/implicationsAdditionally, the study supports the Reserve Bank of India and the Government of India's launched cyber security initiates and schemes which ensure protection for the banking ecosystem i.e. RBI direct scheme, integrated ombudsman scheme, cyber swachhta kendra (botnet cleaning and malware analysis centre), National Cyber Coordination Centre (NCCC) and Security Monitoring Centre (SMC).Practical implicationsStructured and effective internal-led plans for cyber fraud mitigation proposed in this study will conserve banks, employees, regulatory authorities, customers and economic resources, save bank authorities’ and policymakers’ time and money, and conserve resources. Additionally, this will enhance the reputation of the Indian banking industry and extend its lifespan.Originality/valueThe innovative insider-led cyber fraud mitigation approach quickly identifies cyber fraud, prioritizes it, identifies its prominent root causes, map frauds with respective root causes and then suggests strategies to ensure a cost-effective and time-saving bank ecosystem.
Aslib Journal of Information Management – Emerald Publishing
Published: Mar 23, 2023
Keywords: Cyber frauds; Fraud drivers; K-Nearest Neighbour (K-NN); Fraudster-infrastructure-target model; Fraud severity mapping; Prevention framework
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.