2020
DOI: 10.1108/jfc-03-2020-0037
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of cyber-crime effects on the banking sector using the balanced score card: a survey of literature

Abstract: Purpose This study aims to explore the effect of cybercrime on the banking sector and also analyse using balance score approach, the focus of existing literature relating to cybercrime in the banking sector. Design/methodology/approach In this study, a balance scorecard (BSC) was applied to analyse the effect of cybercrime in the banking sector. This was focussed on two out of the four perspectives of BSC. To achieve this, secondary data was used, that is, data from existing research. Findings The outcome … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(18 citation statements)
references
References 12 publications
1
17
0
Order By: Relevance
“…Among the previous studies was that of Akinbowale, Klingelhofer, and Zerihun [5]. After reviewing the literat u re, the authors confirm a growing wave of cybercrimes th at h as harmed the goodwill and economic growth of financial institutions, besides the loss of confidence in the digital infrastructure.…”
Section: Introductionmentioning
confidence: 91%
See 2 more Smart Citations
“…Among the previous studies was that of Akinbowale, Klingelhofer, and Zerihun [5]. After reviewing the literat u re, the authors confirm a growing wave of cybercrimes th at h as harmed the goodwill and economic growth of financial institutions, besides the loss of confidence in the digital infrastructure.…”
Section: Introductionmentioning
confidence: 91%
“…[29] [1] According to Basuchoudhary & Searle [58] adware is annoying because it usually appears on all devices, especially smartphones and tablets, particularly when free software (freeware) or evaluation software (shareware) is installed. Authors that address the crime of Theft: [3], [17], [19], [5], [28], [29], [42], [62], [63], [65], [66], [67], [68], [70], [71], [73]; Terrorism: [3], [22], [50], [61]; Espionage: [3], [22], [24], [29], [42], [56], [58];…”
Section: Onlin E Gamesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, unlike a blockchain, the databases are mutable because they are centralized. Therefore, only the random secrets are stored on-chain after encryption, considering the worst-case scenario (i.e., the consequences of the servers crashing [42]).…”
Section: Transaction Mechanismmentioning
confidence: 99%
“…The framework encompasses four steps of a cyber risk insurance decision plan, namely, information security risk audit, assessment of insurance coverage, evaluation of available policies and selection of suitable policy. It could be accompanied by the development of a real-time alert system capable of creating awareness for both financial institutions and their customers (Akinbowale et al , 2020a, p. 945). Akinbowale et al (2020b, p. 1253) also developed two simplified conceptual models for cyber fraud mitigation.…”
Section: Literature Reviewmentioning
confidence: 99%