scholarly journals Electronic fraud (cyber fraud) risk in the banking industry Zimbabwe

2014 ◽  
Vol 4 (2) ◽  
pp. 17-27
Author(s):  
Shewangu Dzomira

The paper explores forms of electronic fraud which are being perpetrated in the banking industry and the challenges being faced in an attempt to combat the risk. The paper is based on a descriptive study which studied the cyber fraud phenomenon using content analysis. To obtain the data questionnaires and interviews were administered to the selected informants from 22 banks. Convenience and judgemental sampling techniques were used. It was found out that most of the cited types of electronic fraud are perpetrated across the banking industry. Challenges like lack of resources (detection tools and technologies), inadequate cyber-crime laws and lack of knowledge through education and awareness were noted. It is recommended that the issue of cyber security should be addressed involving all the stakeholders so that technological systems are safeguarded from cyber-attacks.

2014 ◽  
Vol 4 (2) ◽  
pp. 116-124 ◽  
Author(s):  
Shewangu Dzomira

The paper investigates digital analytical tools and technologies used in electronic fraud prevention and detection, used in the banking industry. The paper is based on a descriptive study which studied digital forensics and cyber fraud phenomenon using content analysis. To obtain the data questionnaires and interviews were administered to the selected informants from 22 banks. Convenience and judgemental sampling techniques were used. It was found out that fraud detection and prevention tools and technologies would be most effective way of combating e-fraud if they can be utilized. It is concluded that banking institutions should reshape their anti-fraud strategies to be effective by considering fraud detection efforts using advanced analytics and related tools, software and application to get more efficient oversight.


Author(s):  
Syed Ubaid ◽  
Shakil ◽  
Mohammed Talha Alam ◽  
Shahab Saquib Sohail

This paper analyses the increasing cyber-crime in India, especially in the rural areas, andcyber-attacks on service-providing government websites. Cyber-attacks are viewed within the context of important events to reveal the effectiveness of cyber-attack campaigns. The analysis highlights the range of cyber issues experienced during the lockdown in the country due to the COVID-19 pandemic. The paper shows how work-from-home campaigns digitalize the population, and how rural people become the victim of cyber-attacks. The analysis also emphasizes possible solutions to strengthen cyber security.


2019 ◽  
Vol 5 (1) ◽  
pp. 46-48
Author(s):  
Akash RANA

The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines.


Author(s):  
Alaa Hussein Al-Hamami

Through commercial networks and across the Internet, there are data files, millions of images and videos, and trillions of messages flow each day to drive the world economy. This vast electronic infrastructure is what our nation depends on. To commit crime by using a computer and communication to forge a person's identity, illegal imports or malicious programs, the computer here is used as an object or subject for the cybercrime. Most of the online activities are vulnerable to intrusion and can compromise personal safety just as effectively as common everyday crimes. This chapter concentrates on explaining and discussing the terms of cyber security, cybercrimes, and cyber-attacks. A history for each term has been given and the problems of cyber security have been discussed. Finally, a proposed solution has been suggested and future trends have been forecasted, and at the end of the chapter a conclusion will be given.


2021 ◽  
Vol 105 ◽  
pp. 102248 ◽  
Author(s):  
Harjinder Singh Lallie ◽  
Lynsay A. Shepherd ◽  
Jason R.C. Nurse ◽  
Arnau Erola ◽  
Gregory Epiphaniou ◽  
...  

2018 ◽  
pp. 1438-1453
Author(s):  
Alaa Hussein Al-Hamami

Through commercial networks and across the Internet, there are data files, millions of images and videos, and trillions of messages flow each day to drive the world economy. This vast electronic infrastructure is what our nation depends on. To commit crime by using a computer and communication to forge a person's identity, illegal imports or malicious programs, the computer here is used as an object or subject for the cybercrime. Most of the online activities are vulnerable to intrusion and can compromise personal safety just as effectively as common everyday crimes. This chapter concentrates on explaining and discussing the terms of cyber security, cybercrimes, and cyber-attacks. A history for each term has been given and the problems of cyber security have been discussed. Finally, a proposed solution has been suggested and future trends have been forecasted, and at the end of the chapter a conclusion will be given.


2021 ◽  
Vol 8 (2) ◽  
pp. 112-116
Author(s):  
Nazatul Shima Abdul Rani ◽  
K. Sarojani Krishnan ◽  
Khairul Azizan Suda ◽  
Chahhoub Fatimazahra

In the context of Malaysia, the most common types of cyber attacks are denial of service, intrusion attempts, spam, vulnerability report, fraud, malicious code, and content-related attacks as reported by Cyber Security Malaysia. However, since 2011,  cyber attacks such as intrusion attempts, denial of service and spam are decreasing steadily as a result of security measures that have been taken by companies or internet users. Nevertheless,  cyber attacks which are steadily increasing are cyber harassment, intrusion and fraud. Approximately 5,328 fraud incidences were reported in 2011 while in 2020, the number of cases rose to 7,593 cases. Out of these cyber attacks in Malaysia, the most proliferating ones have been identified as fraud incidences. Thus, it is highly needed to come up with and propose the best fraud risk management strategy to handle fraud incidences among internet users and internet providers through the utilization of business intelligence tools, and quality enhancement via quality systems in place, quality information, and quality users. With these tools in hand, it is hoped that the proposed model will serve as a framework to mitigate and/or prevent the occurrence of fraud incidences.


Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Kevin Page ◽  
Max Van Kleek ◽  
Omar Santos ◽  
...  

AbstractMultiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. This will enhance capacities for risk analytics and assists in the creation of a comprehensive and systematic understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when Artificial Intelligence and Machine Learning technologies are migrated to the periphery of the internet and into local IoT networks.


Sign in / Sign up

Export Citation Format

Share Document