Professional Documents
Culture Documents
net/publication/346996140
CITATIONS READS
0 51
1 author:
Joy Tobore-Agana
Bournemouth University
1 PUBLICATION 0 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
An evaluation of the effectiveness of cyber security initiatives in reducing cyber financial crimes View project
All content following this page was uploaded by Joy Tobore-Agana on 14 December 2020.
Bournemouth University
i7724625@bournemouth.ac.uk
Abstract- The main idea of this study is to assess the to criminal opportunities because our everyday
efficiency of current cyber security methods in the reduction or transformation and activities integrates with technology and
mitigation of online financial crime. The study applies the technical (computers, phones) devices.
analysis of wire transfer incidents in assessing established
cyber security measures, as well as makes recommendation for
future improvement. The review of literature reveals a gap
between the use of technical measures and psychological 1.1 SIGNIFICANCE OF STUDY
principles. The paper thus, recommends an empirical testing of
the research hypotheses to ascertain whether a collaboration of A report published by Scott [12], reveals average
both measures (socio-technical approach) will be a more wire transfer amount as $2million compared to $608 cheque
effective mitigation. payment and bank card transaction put together. Thus, it is
safe to say that a great deal of money is at jeopardy in the
Key words- cybersecurity, cyber-attack, socio-technical, online event of a wire transfer fraud. Yet, a payment system of
financial scam, wire transfer. such magnitude is governed by feebly developed legal
framework and disconnected body of common law. While
other payment systems such as cheque and credit cards are
1.0 INTRODUCTION
regulated by comprehensive statutory laws and private
contractual provisions [12]. Similarly, a research conducted
The scope of this study is to evaluate the state of cyber
by Yu [21] suggest that apparent comparative behaviour
security in the financial sector through the analysis of online
control encouraged respondents to use and maintain online
financial scams. The theft of money or other monetary
banking, as empirical result showed the superiority of
assets through technology aided activities is regarded as
internet banking to mobile or traditional banking with
online financial scam [16]. Hence, it is a finance-oriented
respect to user capability, personal usefulness, resource and
crime committed in the virtual space by means of
technology facilitating conditions [21]. Furthermore,
technology and internet [16]. This study aims to appraise
Scornavacca and Hoehle [11] argued that internet banking
security weaknesses, threats and methods employed by
(wire transfer payment) is an alternative channel through
criminals, in addition to current solutions and make
which banks deliver services and for their clients to also
recommendations for the future. A few systems
initiate required services on their own. The motivation of
vulnerabilities and threats such as people, technology,
this study which investigates the effectiveness of cyber
hackers, phishing shall be discussed to evaluate the current
security techniques in the reduction of financial crimes, is
state of cyber security [1]. Nevertheless, it is important to
therefore, born out of the need to secure online financial
note that there is a wide array of financial crimes, that can
platforms due to users’ preference, and the need to protect
be perpetrated through cyber space. They include wire
the financial industry because internet banking has become a
transfer payment fraud, debit and credit card fraud, money
viable alternative to service delivery and the continues
laundry and foreign exchange trading but wire transfer scam
growth of online activities in general [11].
or fraud is the focus of this study.
[7] H. K. N. P. A. a. M. A. Karjaluoto, "Predicting young consumers' take [18] A. a. K. D. Tversky, "Prospect theory: An analysis of decision under
up of mobile banking services.," International journal of bank risk," Econometrica, vol. 47, no. 2, pp. 263-291, 1979.
marketing., vol. 28, no. 5, 2010..
[19] O. a. F. P. Vermesan, Internet of things: converging technologies for
[8] D. a. F. S. Ki-Aries, "“Persona-Centred Information Security smart environments and integrated ecosystems., Aalborg: River
Awareness,," Computers & Security, vol. 20, pp. 663-674., 2017. Publishers, 2013.
[9] T. B. S. a. M. S. Natarajan, "Customers Choice amongst Self Service [20] G. a. M. G. Williamson, Enhanced authentication in online banking,
Technology (SST) Channels in Retail Banking: A Study Using Utica: Doctoral dissertation, Utica College, 2006..
Analytical Hierarchy Process (AHP).," The Journal of Internet
Banking and Commerce,, vol. 15, no. 2, pp. 1-16., 2010. [21] C. Yu, "Consumer switching behavior from online banking to mobile
banking," International Journal of Cyber Society and Education, vol.
[10] D. Raposo, "Software Security," SCADA Security, Florida, 2018. 7, no. 1, pp. 1-28, 2014.
[12] H. Scott, "Corporate Wire Transfers and the Uniform New Payments
Code," HeinOnline, vol. Colum. L. Rev, no. 83, p. 1664, 1983.