Security Risk Management in the Electronic Banking Environment: Some Evidence for Banking Systems
Main Article Content
Abstract
The banking industry has witnessed a significant growth in the use of the Internet, and in the procurement of goods and services and electronic data exchange, which requires a secure Internet to achieve a high level of confidence with institutional customers, so banking institutions realized the importance of security and confidentiality in electronic banking operations.The research aims to answer the following question: How to reduce the security risks in the e-banking environment?. In order to achieve the objective of the research, a descriptive analytical approach was adopted and specialized research was used in the field of e-banking risk management, leading to findings and recommendations.
Article Details
References
Al Hasib, A., & Haque, A. A. M. M. (2008). A comparative study of the performance and security issues of AES and RSA cryptography. Paper presented at the 2008 Third International Conference on Convergence and Hybrid Information Technology.
Aldridge, A., White, M., & Forcht, K. (1997). Security considerations of doing business via the Internet: cautions to be considered. Internet Research.
Alshamari, M. (2016). A review of gaps between usability and security/privacy. International Journal of Communications, Network and System Sciences, 9(10), 413-429.
Ataya, M. A. M., & Ali, M. A. (2019). Acceptance of Website Security on E-banking. A-Review. Paper presented at the 2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC).
Bansal, R. I., Panchal, S. B., Thaker, C., & Valecha, V. A. (2020). Digital certificate containing multimedia content: Google Patents.
Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications, 9(4), 289-306.
Billmaier, J. A., Billmaier, D. P., & Kellum, J. M. (2008). Mobile device confirmation of transactions: Google Patents.
Boldyreva, A., Chenette, N., Lee, Y., & O’neill, A. (2009). Order-preserving symmetric encryption. Paper presented at the Annual International Conference on the Theory and Applications of Cryptographic Techniques.
Boyd, C., Mathuria, A., & Stebila, D. (2003). Protocols for authentication and key establishment (Vol. 1): Springer.
Briggs, P., & Olivier, P. L. (2008). Biometric daemons: authentication via electronic pets CHI'08 extended abstracts on Human factors in computing systems (pp. 2423-2432).
Buttle, F., & Maklan, S. (2019). Customer relationship management: concepts and technologies: Routledge.
Cerovic, I. (2008). Risk Management In Electronic Banking. Montenegrin Journal of Economics, 4(7), 129-133.
Cheng, B. L., Gan, C. C., Imrie, B. C., & Mansori, S. (2019). Service recovery, customer satisfaction and customer loyalty: Evidence from Malaysia’s hotel industry. International Journal of Quality and Service Sciences.
Chorafas, D. N. (2003). Operational risk control with Basel II: Basic principles and capital requirements: Elsevier.
Committee, B. (2003). Risk management principles for electronic banking: Basel: Electronic Banking Group of the Basel Committee on Banking Supervision.
Daka, G. C., & Phiri, J. (2019). Factors Driving the Adoption of E-Banking Services Based on the UTAUT Model. International Journal of Business and Management, 14(6).
Diego, A. (2019). The Analysis of Cyber Security the Extended Cartesian Method Approach With Innovative Study Models: Scientific Research Publishing, Inc. USA.
Easttom, C. (2019). Computer security fundamentals: Pearson IT Certification.
Easttom, C. (2020). Information Assurance/Encryption The NICE Cyber Security Framework (pp. 1-30): Springer.
Ericson, B. C. (2020). IDENTITY CONFIRMATION DURING AUTHENTICATION REQUESTS USING NEARBY MOBILE COMPUTING DEVICES: US Patent App. 16/234,345.
Georgescu, M. (2006). Some issues about risk management for e-banking. Available at SSRN 903419.
Graham, E., & Steinbart, P. J. (2006). Wireless security Enterprise information systems assurance and system security: Managerial and technical issues (pp. 234-252): IGI Global.
Gumussoy, C. A. (2016). Usability guideline for banking software design. Computers in Human Behavior, 62, 277-285.
Hanaek, P., Malinka, K., & Schafer, J. (2008). E-banking security-comparative study. Paper presented at the 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.
Hemery, B., Mahier, J., Pasquet, M., & Rosenberger, C. (2008). Face authentication for banking. Paper presented at the First International Conference on Advances in Computer-Human Interaction.
Hertzum, M., Jørgensen, N., & Nørgaard, M. (2004). Usable security and e-banking: Ease of use vis-a-vis security. Australasian Journal of Information Systems, 11(2).
Herz, F. S., Radin, M., & Madan, B. (2010). Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases: Google Patents.
Jogi, V. (2020). A Critical Study on Emerging Risk Associated with E-Services Provided through E-Banking. Studies in Indian Place Names, 40(51), 5-9.
Kessler, G. C. (2003). An overview of cryptography: Gary C. Kessler.
Khan, B. U. I., Olanrewaju, R. F., Anwar, F., Mir, R. N., & Yaacob, M. (2020). Scrutinising internet banking security solutions. International Journal of Information and Computer Security, 12(2-3), 269-302.
Limba, T., Plėta, T., Agafonov, K., & Damkus, M. (2019). Cyber security management model for critical infrastructure.
Longstaff, T. A., Ellis, J. T., Hernan, S. V., Lipson, H. F., McMillan, R. D., Pesante, L. H., & Simmel, D. (1997). Security of the Internet. The Froehlich/Kent Encyclopedia of Telecommunications, 15, 231-255.
Montero-Canela, R., Zambrano-Serrano, E., Tamariz-Flores, E. I., Muñoz-Pacheco, J. M., & Torrealba-Meléndez, R. (2020). Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks. Ad Hoc Networks, 97, 102005.
MURUGAN, K. (2020). A SURVEY ON SECURITY SYSTEMS AGAINST INTERNET FRAUD IN E-COMMERCE. Studies in Indian Place Names, 40(12), 1787-1791.
Nan, X. (2020). Cpk-based digital bank, digital currency, and payment method: Google Patents.
Nayanajith, G., & Damunupola, K. (2019). Effects of Subjective Norms and Security on Online Banking Adoption: Multilevel Linear Model Analysis. Asian Journal of Multidisciplinary Studies, 2(1), 9-16.
NO, X. (1997). Federal Deposit Insurance Corporation.
Nustini, Y., & Fadhillah, N. (2020). Factors that Influence the Use of e-Banking and the Effect on Consumptivism. Review of Integrative Business and Economics Research, 9, 330-345.
Ortiz-Yepes, D. A. (2008). Enhancing Authentication in eBanking with NFC-enabled mobile phones. ERCIM News(76).
Pejović, I. (2016). Challenges of Modern Electronic Banking. Paper presented at the Sinteza 2016-International Scientific Conference on ICT and E-Business Related Research.
Rahman, R. U., & Tomar, D. S. (2020). Taxonomy of Login Attacks in Web Applications and Their Security Techniques Using Behavioral Biometrics Modern Theories and Practices for Cyber Ethics and Security Compliance (pp. 122-139): IGI Global.
Robinson, Y. H., & Julie, E. G. (2019). MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks. Wireless Personal Communications, 109(2), 739-760.
Romney, M. B., Steinbart, P. J., & Cushing, B. E. (2006). Accounting information systems (Vol. 2): Prentice Hall Englewood Cliffs, NJ.
San Martino, A., & Perramon, X. (2008). A model for securing e-banking authentication process: antiphishing approach. Paper presented at the 2008 IEEE Congress on Services-Part I.
Shankar, A., & Jebarajakirthy, C. (2019). The influence of e-banking service quality on customer loyalty. International Journal of Bank Marketing.
Sokolov, D. (2007). E-banking: risk management practices of the Estonian banks. Institute of Economics at Tallinn University of Technology, 101.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.
Tounsi, W., & Rais, H. (2018). A survey on technical threat intelligence in the age of sophisticated cyber attacks. Computers & security, 72, 212-233.
Turner, L., Weickgenannt, A. B., & Copeland, M. K. (2020). Accounting information systems: controls and processes: John Wiley & Sons.
Xueyan, L., & Shuxu, G. (2008). The fourth biometric-vein recognition: INTECH Open Access Publisher.