ArticlePDF Available

Banking Information Resource Cybersecurity System Modeling

Authors:
  • Institute for Economics and Forecasting of National Academy of Sciences of Ukraine

Abstract and Figures

Citation: Shulha, O.; Yanenkova, I.; Kuzub, M.; Muda, I.; Nazarenko, V. Banking Information Resource Cybersecurity System Modeling. J. Open Innov. Technol. Mark. Complex. 2022, 8, 80. https://doi. Abstract: The rapid development of the process of informatization of modern society has necessitated cybersecurity in all spheres of human activity, as the implementation of deliberate or unintentional influences on the information sphere by both external and internal sources can damage security and lead to moral, material, financial, reputational and other forms of damage. The purpose of the paper is to create functional cognitive models to assess the level of their protection. The method of building a fuzzy cognitive map of the state of cybersecurity of banks is used. There have been developed cognitive models to determine the level of protection of the computer network, information security system and critical infrastructure (banks). Scenarios have been developed that reflect the response of the system at the complex maximum attenuation of the impact of the most important cyber threats. In conclusion, the practical implementation of the method provides an opportunity to predict the state of cybersecurity of banks, and contributes to the implementation of the necessary mechanisms to prevent, protect and control access at the appropriate levels of network infrastructure.
Content may be subject to copyright.
Citation: Shulha, O.; Yanenkova, I.;
Kuzub, M.; Muda, I.; Nazarenko, V.
Banking Information Resource
Cybersecurity System Modeling. J.
Open Innov. Technol. Mark. Complex.
2022,8, 80. https://doi.org/
10.3390/joitmc8020080
Received: 23 March 2022
Accepted: 24 April 2022
Published: 28 April 2022
Publisher’s Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2022 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
Journal of Open Innovation:
Technology, Market, and Complexity
Article
Banking Information Resource Cybersecurity System Modeling
Olha Shulha 1, Iryna Yanenkova 2, Mykhailo Kuzub 3, Iskandar Muda 4,* and Viktor Nazarenko 5
1
Department of Management and Marketing, Faculty of Business and Social Communications, State University
of Intelligent Technologies and Telecommunications, 65023 Odesa, Ukraine; shulha@ua.fm
2Sector of Digital Economy, Institute for Economy and Forecasting of National Academy of Ukraine,
01011 Kyiv, Ukraine; yanenkova@i.ua
3Department of Accounting and Taxation, Kyiv National University of Trade and Economic,
02156 Kyiv, Ukraine; kuzub@ua.fm
4Department of Accounting, Faculty of Economics and Business, Universitas Sumatera Utara,
Medan 20155, Indonesia
5Department of Information Systems and Technologies, Faculty of Engineering and Education,
Dragomanov National Pedagogical University, 01601 Kyiv, Ukraine; nazarenko@email.ua
*Correspondence: mudaiskandar820@yahoo.com
Abstract:
The rapid development of the process of informatization of modern society has necessitated
cybersecurity in all spheres of human activity, as the implementation of deliberate or unintentional
influences on the information sphere by both external and internal sources can damage security and
lead to moral, material, financial, reputational and other forms of damage. The purpose of the paper
is to create functional cognitive models to assess the level of their protection. The method of building
a fuzzy cognitive map of the state of cybersecurity of banks is used. There have been developed
cognitive models to determine the level of protection of the computer network, information security
system and critical infrastructure (banks). Scenarios have been developed that reflect the response of
the system at the complex maximum attenuation of the impact of the most important cyber threats.
In conclusion, the practical implementation of the method provides an opportunity to predict the
state of cybersecurity of banks, and contributes to the implementation of the necessary mechanisms
to prevent, protect and control access at the appropriate levels of network infrastructure.
Keywords: cyber threat; Internet banking; banking information resources; hybrid threat; efficiency
1. Introduction
Active informatization of modern society and increasing flows of confidential infor-
mation have led to the need to provide information (data) security (DS) in various spheres
of public activity, since any process in the financial, industrial, political or social spheres is
directly related to information resources and the use of information technology (IT).
At the same time, due to the growing complexity of information systems (IS) and
technology, the number of potential threats to these systems is increasing. Therefore, to
provide DS and predict the development of specific situations, it is important to assess the
level of security of systems for protection of information (IP) circulating in IS.
It is possible to solve this problem by means of methods of the statistical analysis, in
particular the method of correlation-regression. However, these methods require complex
calculations, a significant amount of experimental data, take a long time to process and
do not provide the ability to work with quality factors that are determined by experts. In
this regard, it is worth paying attention to the cognitive approach based on building fuzzy
cognitive maps (FCM), first proposed by Bart Kosco [1].
The priority of FCM selection is their simplicity, constructiveness and clarity, identifica-
tion of the structure of causal relationships between elements of a complex system that are
difficult to quantify with traditional methods, use of knowledge and experience of subject
matter experts, adaptation to uncertainty of initial data and conditions [
2
]. Furthermore, it
J. Open Innov. Technol. Mark. Complex. 2022,8, 80. https://doi.org/10.3390/joitmc8020080 https://www.mdpi.com/journal/joitmc
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 2 of 17
is worth noting the simplicity of the expansion of factors by introducing additional vertices
and arcs of the graph of a cognitive map [3].
Methods of description and classification are important methods for analysis of the
state of DS provision. To implement effective information protection, it is necessary to
first describe and only then classify the various types of threats and dangers, risks and
challenges, and accordingly, formulate a system of measures to manage them [
4
]. The
methods of casual relationship study are used as common methods for analysis of the level
of DS provision. These methods help to identify the causal relationships between threats
and hazards, search for the causes that became the source and caused the actualization of
certain risk factors, as well as to develop measures for their neutralization. The selection of
methods for analysis of the state of DS provision depends on the specific level and scope of
protection [
5
]. Depending on the threat, the task regarding the differentiation between both
different levels of threats and different levels of protection is made possible. In the sphere
of DS, such levels of protection are usually distinguished [612]:
-
Physical: organization and physical protection of information resources, information
and management technologies;
-
Software and hardware: identification and authentication of users, access control,
logging and auditing, cryptography, shielding, high information assurance;
-
Management: management, coordination and control of organizational, technological
and technical measures;
-
Technological: implementation of DS policy through the use of modern automated IT;
-
User: implementation of IS policy aimed at reducing the reflective impact on DS
objects, preventing information impact from the social environment;
-
Information and telecommunication networks: this policy is implemented in the
format of coordination of actions of the subjects of DS system, which are interrelated
by one goal;
-
Procedural: measures are taken that are implemented by the subjects (personnel
management, physical protection, maintenance of working capacity, response to
security breaches, planning of restoration works, etc.).
-
Furthermore, the methods of DS provision can be subdivided into several
types [1318]
:
- One-level methods that are based on one principle of DS management;
-
Multi-level methods that are based on several principles of DS management, each of
which serves to solve a specific problem;
-
Integrated methods, multi-level technologies that are integrated into a single
organizational-level system of coordination functions for the purpose of DS pro-
vision based on the analysis of a group of risk factors that are semantically-related or
are generated by a single center of information influence;
-
Integrated highly intelligent methods, multi-level, multi-component technologies,
which are built on the basis of powerful automated intelligent tools with organizational
management.
The purpose of the paper is to increase the level of security of systems for protection
of information (IP) circulating in IS, the creation of functional cognitive models to evaluate
the level of their security.
2. Literature Review
Successful open innovations also depend on the open nature of the business model.
Since knowledge has become a key resource for companies, open innovation must be
embedded in the overall business strategy, which clearly recognizes the potential use of
external ideas, knowledge and technology in value creation [
19
]. Due to the integration of
different technologies, the boundaries of the industry are changing or even disappearing,
which necessitates new business models and organizational structures, including effective
human capital management (open culture, diversity, etc.) [20].
Factors that contribute to the spread of open innovations include: growing global
competition; reduction of product life cycles; complexity of new technologies; global
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 3 of 17
mobility of innovators; state support for the development of small innovative enterprises;
market orientation of research; the need for the commercialization of projects by state
laboratories; the emergence of private research institutes; the availability of the Internet and
search technologies; and the need to optimize existing networks of suppliers of strategic
importance [21].
Higher competition and other factors reduce the profitability of innovative companies
in terms of increasing costs in a closed model of the innovation process [
22
]. Applying a
more open model allows you to monetize unused in-house innovation.
The concept of open innovations defines the process of research and development as
an open system, i.e., any company can attract new ideas to create a new product and enter
the market with this product not only through their own development, but also through
cooperation with other organizations.
Open innovations are an approach that allows you to maximize profits from the
joint creation and commercialization of innovative projects, which involves, on the one
hand, using external sources of inventions and technologies to effectively implement their
projects, and on the other hand, opening access to their inventions and technologies to get
the maximum profit from their implementation [23].
The model of “open innovations” assumes that the bank not only relies on its own
in-house research and development when developing new technologies and products, but
also actively uses external innovations and competencies [24].
In general, the authors propose to consider the paradigm of open innovations in terms
of different research determinants.
Spatial determinant. The study of innovations on a global scale is carried out on the
basis of this determinant. As research, technology and product development become global,
the process of open innovation has been simplified [
25
]. Geographical proximity to leading
regional centers allows the company to increase its absorption capacity, thus facilitating
access to knowledge and competencies of the world’s best talents. Access to resources is
one of the main factors in the internationalization of research projects.
Structural determinant. There is a trend to increase the amount of outsourcing and
number of alliances in the field of research and development [
26
]. Industry price chains are
becoming more disaggregated. Cost reduction and greater specialization through more
sophisticated technologies and product systems are drivers of this trend. The use of open
innovations is compensated for the central research and development departments of firms
not only by concentrating on short-term, customer-oriented research activities.
User determinant. This is a determinant, in which users are integrated into the innova-
tion process. This area of research of the innovation process began with the participation of
users, the availability of tools, the idea of mass adaptation and the use of the concept of
democratization of the innovation process [
27
]. User innovation is one of the most studied
parts of the open innovation paradigm.
Supplier determinant. Involving suppliers in the innovation process can significantly
increase innovation productivity in most industries [28].
Technology use determinant. Most studies and practical actions focus on the existing
market and business [
29
]. Despite the potential for new revenue streams, existing research
competencies and the spread of intellectual property to new markets have often been
neglected. Technology development and external commercialization of intellectual property
is a future field of research with high potential.
Process determinant. There are three main processes through which open innovations
are carried out: outside to inside, inside to outside and double process [
30
]. Sometimes these
processes complement each other, but in most cases the external attraction of innovations
is dominant.
Tool determinant. The phenomenon of the open innovation process requires certain
tools that allow customers to, for example, create or customize their own product or allow
companies to integrate through the websites of idea creators [31].
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 4 of 17
Institutional determinant. Open innovation can be considered as an individual-
collective innovation model [
32
]. The private investment model of innovation with tempo-
rary monopolistic profits is replaced by the free search for inventions, findings, discoveries
and knowledge, which is the defining characteristic of the model of open innovations.
Culture determinant. The process of open innovation begins with reflection. Creating
a culture that will be able to assess external competence and know-how is important for
the practice of open innovations [
33
]. This culture, in addition to the internal values of a
company, is influenced by many factors, such as incentive systems, management systems,
communication platforms, project acceptance criteria, supplier evaluations, etc.
Competent search for novel ideas of “open innovations” can save companies a lot
of resources and time. The value of the open innovation model is that it allows you to
synchronize efforts for internal and external research [34].
Thus, “open innovations” reduce the company dependence on high innovation and
other current risks, enabling the company to gain strategic advantages in competition.
However, the process of using “open innovations” has its difficulties and internal risks [
35
].
The most important thing is managerial risk. Implementation of “open innovations” requires
high analytical and managerial skills from managers, it is necessary to be able to timely
anticipate current innovations, track them, and work productively not only with your team
but also other people, often even from other states [36].
Since the market for “open innovations” is accessible for all players in risky innovation,
there is a risk of interception of innovative business ideas and insecurity of intellectual
property [
37
]. Thus, to create a unique innovation, it is important to support external
research with internal research. That is, the reference model of “open innovations” involves
a two-way combination of promising external innovations complemented by internal
solutions aimed at improving or creating new business models.
Formation of risk management, especially in the field of cyber security, should take
into account the risks of innovation and create a platform for the use of promising ideas,
which is possible only in the formation of integrated risk management, which aims to
reconcile innovation and risk at all levels. Risk management structure should include a
unit of innovation management of banks.
3. Methods
It is convenient to use fuzzy logic methods to solve problems related to the analysis of
DS threats and risks. Thus, in the paper [
19
], a fuzzy hierarchical model was built, which
contains linguistic variables and fuzzy knowledge bases; a linguistic risk assessment of
information assets based on the Coras methodology was suggested [20].
In the paper [
21
], it is demonstrated that when calculating the risk of DS threat using a
fuzzy set model with different possible options for the content of expert data for the same
threats, the levels of DS risk can differ significantly. These data are as follows: membership
functions; term sets; and production rules.
The authors of the paper [
22
] developed methods and models for fuzzy quantification
of DS risks based on fuzzy set theory. However, the methods suggested by the authors do
not take into account the impact of assets on the end result of the organization operation.
In the paper [
38
], a fuzzy production model was developed, which allows to signifi-
cantly expand the capabilities of existing methods, remove restrictions on the number of
input variables and integrate both qualitative and quantitative approaches to risk assess-
ment. The risk assessment mechanisms based on fuzzy logic that are used in the technique
allow to obtain a linguistic description of the degree of risk, which makes it possible for IT
managers to identify risk priorities and select an action plan to reduce the most dangerous
DS threats of the organization.
In the paper [
23
], the authors describe the general provisions of DS risk assessment us-
ing fuzzy set theory. Linguistic variables characterize the general parameters that are most
often used in risk assessment: threat probability; assets; and their ratio of vulnerabilities
to threats.
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 5 of 17
The authors of the paper [
24
] describe a fuzzy model of risk assessment for the whole
organization and take fuzzy variables that describe risk factors (organizational, technical
levels of IP, value and volume of information resources) as input characteristics. With that,
specific vulnerabilities and their impact on the target system are not taken into account.
In the paper [
25
], the process of creation of a fuzzy production model for DS risk
assessment is considered. The model includes the bases of rules and allows to carry out the
linguistic analysis of risks which pose potential threats and incur losses for the organization.
The relationship between factors (antecedent) and risk indicators (consequent) is a binary
fuzzy relationship based on the Cartesian product of the corresponding fuzzy sets. Fuzzy
causal relationship between the antecedent and consequent is defined as a fuzzy product.
The mechanism of obtaining risk assessments based on fuzzy logic allows us to obtain the
numerical value of risk, linguistic description of the degree of risk, as well as the level of
confidence of the expert in the occurrence of risk.
The authors of the paper [
26
] built a model for evaluation of the general level of
information risks in the CRM system using a linguistic approach that provides a quanti-
tative description of individual elements of the model in terms of fuzzy information on
the importance of criteria for evaluation risk factors. This makes it possible to identify
significant risk factors, their consequences in the conditions of the threat agent action, and
thus, to identify alternative ways to avoid the negative impact of risk.
The authors of the paper [
27
] suggested an approach to assessing the risks of DS based
on the concept of logical-linguistic fuzzy model based on the set of Mamdani rules.
It should be noted that the evaluation of the cumulative effect of threats on the system
and the ability to identify risks in different scenarios of implementation of multiple threats
are important issues of DS provision. These issues can be solved using cognitive modeling
methods. Cognitive models are built by an expert or a group of experts in the subject area
under study on the basis of theoretical, statistical and expert information about the object
of study [
28
]. The adequacy of the model is determined by the completeness of the set of
input knowledge; the model can be refined in the process of study and use, itself being a
source of structured knowledge.
Cognitive modeling methods are based on the use of FCMs, which are characterized
by relative ease of interpretation, integration with evaluation methods of analysis results,
visual clarity, flexibility, constructability, adaptability to uncertainty of input data, use of
specific expert knowledge and experience, absence of need for anticipatory specification of
data and impact relationships [29].
The FCM of a complex system (problem) is an oriented graph, which vertices (concepts)
represent system variables, and arcs—causal relationships between concepts, with the
weights of these relationships determining the strength of the mutual concept influence [
30
].
A cognitive map is a model of presenting expert knowledge of the laws of development
and properties of the situation under study, and their diversity is determined by different
ways of expert determination of the strength of causal relationships and the values of
factors in the cognitive map [31].
Special attention is paid to network security for the proper network operation and
reliable provision of all the above services, since computer networks (CNs) and their
resources are constantly at risk of infection with malicious software (SW) or various types
of network attacks. As a result of these attacks, attackers can get unauthorized access
(UAA) to information resources, commit theft, destruction or corruption of data, disrupt
the operation and availability of the service, gain control over the whole system. To prevent
the above actions, it is necessary to analyze the impact of possible threats on the system,
assess the strength of their action, highlighting the most important of them.
It is possible to solve this problem with the help of statistical analysis methods, specifi-
cally, the methods of variance analysis and correlation-regression analysis. However, these
methods require complex calculations, the availability of sufficiently complete statistical
information and a long time to process the necessary data. Thus, it is worth paying at-
tention to the cognitive approach, which provides an opportunity to solve problems that
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 6 of 17
cannot be strictly formalized, clearly present the system or problem, use incomplete, fuzzy
information and subjective judgments of subject experts, and build flexible, constructive
models that adequately respond to change.
Taking into account the above advantages of cognitive modeling, the authors will
conduct a study of the impact of threats on the level of CN protection on its basis.
To achieve the purpose in hand, the authors will first analyze the possible threats
to network security, which characterize the possible actions that can be taken in relation
to the system. They manifest in various forms, but the most common of them are as
follows [27,28]:
-
Random hazards: a person who is unfamiliar with the relevant regulations and
policies, or through improper care, creates a random hazard;
-
Unauthorized changes: updates, fixes and other changes to operating systems, soft-
ware applications, configurations, interoperability and hardware may pose an unex-
pected threat to the security of industrial automation and control systems or related
industrial processes.
To identify general change trends in network security, the authors will study a corpo-
rate network with common characteristics.
Here is a list of possible threats, the implementation of which will lead to negative
consequences of the network operation [2328]:
1. Scan attacks—search for possible system vulnerabilities:
- Packet sniffers—interception and analysis of traffic;
- Ping sweeps—search for IP addresses of running computers;
- Port scanner—scanning open TCP and UDP ports;
- Phishing—method of obtaining the necessary information directly from CN users.
2. Web attacks:
-
Cross-Site Scripting (XSS)—malicious collection of user information through web
application pages;
-
SQL injection—one of the common ways to hack sites and programs that work with
databases based on the introduction of a random SQL code in the query;
-
Path traversal—processing of HTTP requests by attackers to bypass access control and
access other directories and files on the system.
3. Spoofing—replacement of a trusted entity:
-
IP-spoofing—using someone else’s sender’s IP address to defraud the security system;
-
DNS-spoofing—changing domain name cache data to assign an erroneous IP address;
- DHCP-spoofing—replacement of a default gateway.
4. Attacks aimed at gaining access to the system:
- Password attacks—password hacking;
-
Trust exploitation—compromising a trusted host by using it to attack other hosts on
the network;
-
Man-in-the-middle attack—compromising a communication channel with help of
which an attacker interferes with the data transmission protocol by deleting or modi-
fying information.
5. Session hijacking—using an ongoing computer session to gain unauthorized access
(UAA) to CN information or services.
6. Compromised key attack—interception of a secret key.
7. Spamming—abuse of email capabilities.
8. Denial of Service (DoS) attack—avalanche packet routing, which overloads the
network, and as a result makes it inaccessible.
9. Malicious SW (trojans, worms, virus, botnets, etc.)—software intended for disrupt-
ing the network operation, collecting confidential information or gaining access to private
computer systems.
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 7 of 17
10. Physical impact on the network on the side of an attacker that leads to the de-
struction or failure of physical components, such as hardware, software storage devices,
connectors, sensors and controllers.
11. Disclosure of information, intentional or negligent actions of the user, as a result of
which a person who does not have access to this information, gets acquainted with it.
12. Unintentional actions, mistakes of network users including accidental actions
that are taken due to ignorance, carelessness or negligence, out of curiosity, but without
malicious intent.
13. Natural and technogenic disasters (accidents, hurricanes, earthquakes, fires, etc.).
It should be noted that the author’s novelty is the improvement of the cyber security
assessment model in banks. The main specificity of the model is that the analytical base
(initial data for calculations) is a trade secret of the bank. According to the bank internal
protocols, this base is not open information that is subject to publication. So, the novelty of
open innovation is just the cognitive model.
The authors examine the object of the banking institution, which belongs to the class
of objects that provide access to the Internet and reflects the maximum representation of
the structural components. The authors create a number of threats to this object, noting
that the main directions of the attack vector are aimed at IT infrastructure and operational
technologies. With that, a large number of threats are aimed at the Supervisory Control
and Data Acquisition (SCADA) and Distributed Control Systems (DCS), which provide
essential services to banks.
Analysis of existing methods demonstrated that they require complex calculations,
the availability of sufficiently complete statistical information, a long time to process the
necessary data. Besides, in case of most methods, the risk assessment is carried out only to
the level of assets, and their impact on the functioning of the system under study is not
taken into account. With that, the solution of this problem is directly related to the human
factor and is characterized by a high degree of uncertainty, the complexity of formalizing
the impact of threats. Therefore, to address this issue, it is advisable to pay attention to
the methods of cognitive approach, which provides an opportunity to solve the above
problems, clearly presenting the system under study with the help of flexible design models
capable of adequate response to change.
The developed cognitive model for determining the level of security of the information
protection system provides a sufficient degree of detail, allows taking into account the
presence of a large number of alternative scenarios for implementation of threats. Based on
the data obtained from the launch of these scenarios, it is possible to develop a clear plan
for improving the security of the information protection system, timely take the necessary
measures to prevent, localize, eliminate or reduce the impact of potential information
security threats.
To build the FCM, which determines the security status of a computer networks (CN),
first of all, it is necessary to form from the above list a variety of concepts, which are most
important from the point of view of studying this problem. In accordance with the above
methodology, the following concepts were distinguished:
-
Network attacks (scan attacks, web attacks, spoofing, attacks aimed at gaining system
access, session hijacking, and compromised key attacks);
- Spamming;
- Malware;
- Physical impact on the network on the side of an attacker;
- DoS attacks;
- Disclosure of information;
- Unintentional actions, mistakes of network users;
- Reliability, fault tolerance of hardware and software;
- CN security;
- Fault tolerance of network service;
- Natural and technogenic disasters.
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 8 of 17
Having formed the list of concepts, the authors define values of influence force between
each pair of concepts by processing of the data received as a result of expert poll.
To do this, the authors set a fuzzy linguistic scale, which is an ordered set of linguistic
values (terms) of estimates of the occurrence of probable consequences obtained as a result
of influence of one concept on the other concept:
Relationship strength =(No in f luenc e;Weak;Very weak;
Medium;Strong;Very strong )(1)
To each of these values the authors assign a numerical range belonging to segment
[0, 1] for positive relationships and segment [1, 0] for negative relationships:
vo,u=
(0.85; 1],positive very strong;
(0.6; 0.85],positive strong;
(0.35; 06),positive medium;
(0.15; 0.35),positive weak;
(0; 0.15),positive very weak;
0, no influence;
(0; 0.15],negative very weak;
(0.15; 0.35],negative weak;
(0.35; 0.6],negative medium;
(0.6; 0.85],negative strong;
(0.85; 1],negative very strong
(2)
The FCM, which illustrates the multiple causal relationships and the nature of the
interaction of certain factors, is given in Figure 1.
The modeling was carried out using the tools of Mental Modeler SW.
The built FCM consists of eleven concepts:
(1) Six concepts of “Driver” type—they influence other concepts but are not influenced
by any of the concepts of the system;
(2) One concept of “Receiver” type—it is influenced by the concepts of the system,
and it does not influence any of them;
(3) Four concepts of “Ordinary” type—these are ordinary, intermediate concepts,
which influence and are influenced by some system concepts.
To determine the complexity of the developed FCM, the authors calculate the density
of relationships using the formula Department of Accounting and Taxation, Kyiv National
University of Trade and Economic, Kyiv, 02156, Ukraine
D=K
M×(K1)(3)
where
D
—density of cognitive model relationships;
K
—number of relationships;
M—number of concepts.
In this case
M
= 11,
K
= 16, then
D
= 0.15. This indicates the sufficient complexity of
the developed cognitive model.
To analyze the FCM, it is necessary to take into account all the indirect mutual influence
of concepts. For the purpose, on the basis of the built cognitive map, the authors create a
contiguity matrix V= [v(F0,Fu)]M×M(Table 1).
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 9 of 17
J. Open Innov. Technol. Mark. Complex. 2022, 8, x FOR PEER REVIEW 9 of 17
Natural and man-made
disasters (F11)
Hardware and
software reliability,
fault tole rance (F8)
Network attacks of a
malicious user (F1)
Information disclosure
on the side of a user
(F6)
Computer network
security (F9)
Unintentional actions,
mistakes of network
users (F7)
Attacker spamming
(F2)
Malware (F3)
Physical network
impact on the side of
an attacker (F4)
DoS-attacks of a
malicious user (F5)
Network maintenance
fault tolerance (F10)
—negative relationship
—positive relationship
Figure 1. Fuzzy cognitive map of the state of bank cybersecurity.
The modeling was carried out using the tools of Mental Modeler SW.
The built FCM consists of eleven concepts:
(1) Six concepts of “Driver” type—they influence other concepts but are not influ-
enced by any of the concepts of the system;
(2) One concept of “Receiver” type—it is influenced by the concepts of the system,
and it does not influence any of them;
(3) Four concepts of “Ordinary” type—these are ordinary, intermediate concepts,
which influence and are influenced by some system concepts.
To determine the complexity of the developed FCM, the authors calculate the den-
sity of relationships using the formula Department of Accounting and Taxation, Kyiv
National University of Trade and Economic, Kyiv, 02156, Ukraine
( 1)
K
DM K
 
(3)
where
D
—density of cognitive model relationships;
K
—number of relationships;
—number of concepts.
In this case
= 11,
K
= 16, then
D
= 0.15. This indicates the sufficient com-
plexity of the developed cognitive model.
To analyze the FCM, it is necessary to take into account all the indirect mutual in-
fluence of concepts. For the purpose, on the basis of the built cognitive map, the authors
create a contiguity matrix 0
[ ( , )]
u
M M
V v F F
(Table 1).
Table 1. Contiguity matrix of fuzzy cognitive map of bank cybersecurity.
Concept
1
F
2
F
3
F
4
F
5
F
6
F
7
F
8
F
9
F
10
F
11
F
1
F
–0.79
2
F
–0.18 –0.48
3
F
–0.89 –0.59
Figure 1. Fuzzy cognitive map of the state of bank cybersecurity.
Table 1. Contiguity matrix of fuzzy cognitive map of bank cybersecurity.
Concept F1F2F3F4F5F6F7F8F9F10 F11
F1 –0.79
F2 –0.18 –0.48
F3 –0.89 –0.59
F4 –0.81
F5 –0.42 –0.99
F6 –0.74
F7 –0.71
F8 0.49 0.61 –0.62 0.65
F9
F10 0.65
F11 –0.79
After analyzing the value of these indicators it is possible to identify the most im-
portant concepts of the system under study:
F
3—malware;
F
4—physical impact on the
network on the side of an attacker;
F
7—unintentional actions, mistakes of network users.
Furthermore, it should be noted that such concept as
F
2—spamming has the smallest
impact on the network operation.
4. Results
To obtain forecasts for the situation development, the authors determine the relative
change in the concepts of the system with the maximum value of the influence of the most
important factors on them. That is, they model the corresponding scenarios.
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 10 of 17
Scenario 1. The authors consider how the state of the system will change with the
maximum increase in the value of the concept F3—malware.
Malicious programs include: trojans and spyware, worms, viruses, logic bombs, and
some other programs designed for DS violation. These programs can infiltrate attacked
computers in a variety of ways. This is most often the case when a user downloads files
from unverified sources (removable media or websites) or thoughtlessly opens a suspicious
file that he or she receives in an email. There are also more dangerous malicious programs
that have their own “reproduction” mechanisms, copies of these programs are distributed
to computers on the network without the participation of users.
In the system under study, the concept
F
3—malware has a direct influence on
F10—fault
tolerance of network service and F9—CN security.
As a result of the maximum increase in the value of the influence of malicious pro-
grams, the fault tolerance of network service is reduced by 0.04, and the computer network
security is reduced by 0.05 (Figure 2).
J. Open Innov. Technol. Mark. Complex. 2022, 8, x FOR PEER REVIEW 10 of 17
4
F
–0.81
5
F
–0.42 –0.99
6
F
–0.74
7
F
–0.71
8
F
0.49 0.61 –0.62 0.65
9
F
10
F
0.65
11
F
–0.79
After analyzing the value of these indicators it is possible to identify the most im-
portant concepts of the system under study:
3
F
—malware;
4
F
—physical impact on
the network on the side of an attacker;
7
F
—unintentional actions, mistakes of network
users. Furthermore, it should be noted that such concept as
2
F
—spamming has the
smallest impact on the network operation.
4. Results
To obtain forecasts for the situation development, the authors determine the rela-
tive change in the concepts of the system with the maximum value of the influence of
the most important factors on them. That is, they model the corresponding scenarios.
Scenario 1. The authors consider how the state of the system will change with the
maximum increase in the value of the concept
3
F
—malware.
Malicious programs include: trojans and spyware, worms, viruses, logic bombs,
and some other programs designed for DS violation. These programs can infiltrate at-
tacked computers in a variety of ways. This is most often the case when a user down-
loads files from unverified sources (removable media or websites) or thoughtlessly
opens a suspicious file that he or she receives in an email. There are also more dangerous
malicious programs that have their own “reproduction” mechanisms, copies of these
programs are distributed to computers on the network without the participation of us-
ers.
In the system under study, the concept
3
F
—malware has a direct influence on
10
F
—fault tolerance of network service and
9
F
—CN security.
As a result of the maximum increase in the value of the influence of malicious pro-
grams, the fault tolerance of network service is reduced by 0.04, and the computer net-
work security is reduced by 0.05 (Figure 2).
-0.05
-0.04
-0.06
-0.05
-0.04
-0.03
-0.02
-0.01
0
F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11
Parameter
Concepts
Figure 2. Scenario demonstrating the system response to the most negative changes in the concept
3
F
—malware.
Figure 2.
Scenario demonstrating the system response to the most negative changes in the concept
F3—malware.
To avoid or prevent the negative action of malware, it is advisable to regularly up-
date software, including the operating system and all applications, use reliable antivirus
programs, create backups that are stored on the hard drive offline, etc.
Scenario 2. The authors model a situation that will reflect changes in the system with
the maximum increase in the value of the concept
F
4—physical impact on the network on
the side of an attacker.
In this case, an important place is occupied by physical means of network protection,
which are designed to create obstacles in the way of a potential intruder who may enter the
premises without authorization, make an act vandalism, commit a theft and other actions
that adversely affect the network.
The concept
F
4—physical impact on the network on the side of an attacker has a
direct impact on such system concepts as:
F
8—reliability, fault tolerance of hardware and
software, and
F
10—fault tolerance of network service, and an indirect impact on
F
9—CN
security. The authors study the relative changes in these concepts (Figure 3).
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 11 of 17
J. Open Innov. Technol. Mark. Complex. 2022, 8, x FOR PEER REVIEW 11 of 17
To avoid or prevent the negative action of malware, it is advisable to regularly up-
date software, including the operating system and all applications, use reliable antivirus
programs, create backups that are stored on the hard drive offline, etc.
Scenario 2. The authors model a situation that will reflect changes in the system
with the maximum increase in the value of the concept
4
F
—physical impact on the
network on the side of an attacker.
In this case, an important place is occupied by physical means of network protec-
tion, which are designed to create obstacles in the way of a potential intruder who may
enter the premises without authorization, make an act vandalism, commit a theft and
other actions that adversely affect the network.
The concept
4
F
—physical impact on the network on the side of an attacker has a
direct impact on such system concepts as:
8
F
—reliability, fault tolerance of hardware
and software, and
10
F
—fault tolerance of network service, and an indirect impact
on
9
F
—CN security. The authors study the relative changes in these concepts (Figure 3).
-0.05
-0.02
-0.06
-0.07
-0.06
-0.05
-0.04
-0.03
-0.02
-0.01
0
F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11
Paramet er
Concepts
Figure 3. Scenario demonstrating the system response to the most negative changes in the concept
4
F
—malware.
Based on this bar chart, one can draw a conclusion that when increasing the value
of this concept, the security of computer networks decreases by 0.01, reliability, fault
tolerance of hardware and software—by 0.04, and fault tolerance of network service—by
0.05. Therefore, special attention should be paid to strengthening the physical means al-
lowing the solving of problems related to the protection of territory, premises, equip-
ment and the implementation of controlled access to them.
Scenario 3. The authors examine possible changes of concepts at the maximum in-
crease of negative influence of the concept
7
F
—unintentional actions, mistakes of net-
work users on the network.
Unintentional actions, mistakes of users, operators and system administrators who
maintain the network can lead to malfunctions or complete inoperability of the system,
as well as to create vulnerabilities that can be exploited by attackers.
The concept
7
F
—unintentional actions, mistakes of network users has a direct in-
fluence on the concepts
3
F
—malware,
6
F
—disclosure of information by a user,
8
F
—reliability, fault tolerance of hardware and software,
9
F
—CN security and an in-
direct influence on the concept
10
F
—fault tolerance of network service. The authors
consider the relative changes in the values of these concepts (Figure 4).
Figure 3.
Scenario demonstrating the system response to the most negative changes in the concept
F4—malware.
Based on this bar chart, one can draw a conclusion that when increasing the value
of this concept, the security of computer networks decreases by 0.01, reliability, fault
tolerance of hardware and software—by 0.04, and fault tolerance of network service—by
0.05. Therefore, special attention should be paid to strengthening the physical means
allowing the solving of problems related to the protection of territory, premises, equipment
and the implementation of controlled access to them.
Scenario 3. The authors examine possible changes of concepts at the maximum increase
of negative influence of the concept
F
7—unintentional actions, mistakes of network users
on the network.
Unintentional actions, mistakes of users, operators and system administrators who
maintain the network can lead to malfunctions or complete inoperability of the system, as
well as to create vulnerabilities that can be exploited by attackers.
The concept
F
7—unintentional actions, mistakes of network users has a direct influence
on the concepts
F
3—malware,
F
6—disclosure of information by a user,
F
8—reliability, fault
tolerance of hardware and software,
F
9—CN security and an indirect influence on the
concept
F10
—fault tolerance of network service. The authors consider the relative changes
in the values of these concepts (Figure 4).
J. Open Innov. Technol. Mark. Complex. 2022, 8, x FOR PEER REVIEW 12 of 17
0.07
0.08
-0.06
-0.07
-0.02
-0.08
-0.06
-0.04
-0.02
0
0.02
0.04
0.06
0.08
0.1
F3 F4 F5 F6 F7 F8 F9 F10 F11
Paramet er
Concepts
Figure 4. Scenario demonstrating the system response to the most negative changes in the concept
7
F
—malware.
The resulting bar chart shows that the above actions will result in increase in the
values of such concepts as
3
F
—malware (by 0.07) and
6
F
—disclosure of information
by a user (by 0.08), which will worsen the fault tolerance of network service (by 0.02)
and fault tolerance of hardware and software (by 0.06), and this, in turn, will decrease
CN security by 0.07. Thus, it is necessary to properly organize work with staff, which
involves quality selection and placement of staff, including training in the rules of con-
fidential information, familiarization with measures of responsibility for violating the
rules of IP, systematic control over the work of staff with confidential information, ac-
counting, storage and destruction of documents and technical media, periodic training,
etc.
Figure 5 demonstrates the relative change in the level of CN security, with a com-
plex maximum weakening of the impact of the most important threats.
-0.32
0.39
0.65
0.52
-0.4
-0.2
0
0.2
0.4
0.6
0.8
F6 F7 F8 F9 F10 F11
Parameter
Concepts
Figure 5. Scenario demonstrating the system response, with a complex maximum weakening of
the impact of the most important threats.
As a result of the analysis of this bar chart, it is possible to draw a conclusion that
under the given conditions CN security will increase by 0.65 conditional units, i.e., by
65%.
Thus, the developed fuzzy cognitive map of the analysis of the impact of threats on
the level of network security reflects mainly the qualitative trends in the situation de-
Figure 4.
Scenario demonstrating the system response to the most negative changes in the concept
F7—malware.
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 12 of 17
The resulting bar chart shows that the above actions will result in increase in the
values of such concepts as
F
3—malware (by 0.07) and
F
6—disclosure of information by
a user (by 0.08), which will worsen the fault tolerance of network service (by 0.02) and
fault tolerance of hardware and software (by 0.06), and this, in turn, will decrease CN
security by 0.07. Thus, it is necessary to properly organize work with staff, which involves
quality selection and placement of staff, including training in the rules of confidential
information, familiarization with measures of responsibility for violating the rules of IP,
systematic control over the work of staff with confidential information, accounting, storage
and destruction of documents and technical media, periodic training, etc.
Figure 5demonstrates the relative change in the level of CN security, with a complex
maximum weakening of the impact of the most important threats.
J. Open Innov. Technol. Mark. Complex. 2022, 8, x FOR PEER REVIEW 12 of 17
0.07
0.08
-0.06
-0.07
-0.02
-0.08
-0.06
-0.04
-0.02
0
0.02
0.04
0.06
0.08
0.1
F3 F4 F5 F6 F7 F8 F9 F10 F11
Paramet er
Concepts
Figure 4. Scenario demonstrating the system response to the most negative changes in the concept
7
F
—malware.
The resulting bar chart shows that the above actions will result in increase in the
values of such concepts as
3
F
—malware (by 0.07) and
6
F
—disclosure of information
by a user (by 0.08), which will worsen the fault tolerance of network service (by 0.02)
and fault tolerance of hardware and software (by 0.06), and this, in turn, will decrease
CN security by 0.07. Thus, it is necessary to properly organize work with staff, which
involves quality selection and placement of staff, including training in the rules of con-
fidential information, familiarization with measures of responsibility for violating the
rules of IP, systematic control over the work of staff with confidential information, ac-
counting, storage and destruction of documents and technical media, periodic training,
etc.
Figure 5 demonstrates the relative change in the level of CN security, with a com-
plex maximum weakening of the impact of the most important threats.
-0.32
0.39
0.65
0.52
-0.4
-0.2
0
0.2
0.4
0.6
0.8
F6 F7 F8 F9 F10 F11
Parameter
Concepts
Figure 5. Scenario demonstrating the system response, with a complex maximum weakening of
the impact of the most important threats.
As a result of the analysis of this bar chart, it is possible to draw a conclusion that
under the given conditions CN security will increase by 0.65 conditional units, i.e., by
65%.
Thus, the developed fuzzy cognitive map of the analysis of the impact of threats on
the level of network security reflects mainly the qualitative trends in the situation de-
Figure 5.
Scenario demonstrating the system response, with a complex maximum weakening of the
impact of the most important threats.
As a result of the analysis of this bar chart, it is possible to draw a conclusion that
under the given conditions CN security will increase by 0.65 conditional units, i.e., by 65%.
Thus, the developed fuzzy cognitive map of the analysis of the impact of threats
on the level of network security reflects mainly the qualitative trends in the situation
development, and is one of the means of work optimization when setting up computer
network protection.
5. Discussion
5.1. The Key Factors of Banking Information Resource Cyber Security System
The rapid development of IT and their implementation in all spheres of public life
determines the extreme importance of creating reliable information protection systems.
The problem of quality functioning of these systems, given the emergence of new threats
and growing levels of existing ones in the information space, is becoming increasingly
important [
39
]. Moreover, an important practical problem is to establish an optimal bal-
ance between ensuring the security of the information protection system and the amount
of costs for its support, given the rational distribution between the individual areas of
protection [40].
Separately, it should be noted that at the initial stages of creating an effective security
system of banks there appears a need to quantify the importance of potential threats, the
implementation of which will lead to disruption of research facilities operation and will
manifest itself in the form of stopping provision of population of both individual cities, and
the state as a whole, with vital services and goods. In turn, this can lead to socio-political
and economic instability, exacerbation of conflicts of various kinds [41].
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 13 of 17
At the same time, the main sources of threats may be the high level of depreciation
and breakdown rate of fixed assets, the impact of dangerous natural phenomena, the tense
military-political and economic situation in the country, etc. [42].
In the vast majority of cases, the above issues are solved using statistical analysis
methods, which require consideration of a significant amount of information and complex
calculations, and take a long time to process [43].
One of the options to solve this problem may be the ranking of threats, which will
permit to determine the acceptable intensity of reduction of the systems under study, and
establish the proportional ratio of allowable costs to ensure their security.
Specifically, the method of non-strict ranking is proposed in [
12
]. According to this
method, an expert develops a numbering of all criteria in descending order of acceptability
of the negative consequences related with the given security criterion. The ranked crite-
ria are then numbered sequentially. The rating (rank) of the criterion is determined by
its number.
In [
44
], fuzzy logic-based ranking of information risks is carried out using the algorithm
of Mamdani, which was one of the first algorithms to be used in fuzzy inference systems.
Moreover, there are a lot of works related to the ranking of elements in other areas
of activity. For example, there suggested a method of ranking the factors influencing the
reliability of the system based on the theory of a fuzzy cognitive map (FCM) [
45
]. The
method is based on the formalization of causal relationships in the form of FCM, i.e., an
oriented graph, which vertices correspond to the reliability of the system and the factors
that influence it, and weighted arcs reflect the power of factor influence on each other and
the reliability of the system. The rank of the factor is defined as analogous to the index of
element importance according to Birnbaum.
Let us pay attention to another work of this scientist [
46
], where he suggests a method
of ranking the elements of a multi-functional system based on fuzzy mathematics. The
problem is reduced to automatic classification using transitive closure of fuzzy similarity
relationship. The initial information about the system is given in the form of a fuzzy ratio
of the influence of element failures on the performance of the function. The degree of
influence of elements on the system functions is calculated by comparing with the smallest
influence on the Saaty scale.
It can be concluded that there are many methods for evaluation of information security,
in particular cyber security. Depending on the specifics of the methodological platform,
different evaluation results are obtained.
5.2. Banking Cyber Security System and Open Innovation
In the current conditions, the task of preventing the development of negative trends
in relation to the continued bank operation, as well as minimizing the causes of threats of
cyber attacks, is assigned to modern technologies.
Banking open innovations are practical innovations introduced into any area of bank
activities to achieve a positive economic and strategic effect [
47
]. At the same time, the
needs of customers should be met, and the current process of providing banking services
should be modernized.
Open innovations are considered not only as a way to improve the effectiveness
indicators of a financial and credit organization, but furthermore, in the conditions of
constant risks, as a tool for ensuring information security.
At the moment, innovations in the banking sector are related to distance customer
service, Internet banking, electronic money, etc. [48].
Demanded bank of the 21st century is a bank with a set of unique technologies
that allow you to make financial transactions anywhere and anytime fast, efficiently and
safely [49].
In addition, open innovations introduced into the workflow are designed to provide
the following customer-centric services: simple, fast, round-the-clock and accessible search
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 14 of 17
for information about the bank products and services from any digital device; information
security of user data; promt feedback; business process optimization [50].
Thus, today a process of reorganization of bank activities is taking place that is oriented
to the client through the development and implementation of the technology of the future,
as well as by stimulating behavior focused on open innovative transformation [51].
Determining the effect of the introduction of open innovations as profitable solutions
by banks, one should take into account such indicators of the bank operation as profitability
and growth of assets, an increase in client resources and interest income, as well as loans
and debts of clients [52].
Strategically, it is important to rely on the best practices of the banking innovative
development, to constantly monitor the emergence of advanced technologies on the ICT
market, and to qualitatively adapt them to the national conditions of the bank operation [
53
].
For example, there are a number of IT security innovations aimed at ensuring the
security of personal data, preventing information leakage, storing and backing up data,
protecting against cyber attacks, viruses and other threats to system security [
54
]. Such
innovations are based on a process-oriented approach (for example, service-oriented archi-
tecture, cloud computing, data leak prevention, etc.) [55].
The technology that is most widely used by banks is the Big Data technology (or
“Big Data”) [
56
], which makes it possible not only to store huge amounts of information,
quickly find the necessary data in big arrays, process and structure the data, but also
protect information resources against theft, loss, destruction, disclosure and distortion by
unauthorized users. With the help of Big Data, Mastercard, VISA, Facebook, Google, etc.
are actively used in their activities [57].
Thus, the analyzed innovations perform the following functions in the area of in-
formation security: a timely response to attempts of unauthorized access to databases;
maintaining a record of all operations on the local network; identification of users, resources
and personnel of the network information security system, including identification and
authentication of the user by the input credentials.
6. Conclusions
We aim to provide information about individual components and how they work
together in applications, operating systems, servers, data stores, and many other places
for a complete picture of performance. With the help of the infrastructure condition
monitoring function, it is possible to: monitor the level of resource use (CPU, RAM, HDD);
analyze ways of data access and performance of production activities; and risk and impact
assessment. In the current conditions, business priorities are often at odds with the constant
pressure of growing cyber threats.
The pandemic with its lockdowns shifted the perimeter of protection of financial
institutions to the homes of users, which required the expansion and strengthening of in-
formation security requirements. In particular, the regulator is going to provide banks with
methodical recommendations on strengthening the security of online banking operations,
online operations with cards, mobile applications and messenger chatbots.
It is not enough for financial institutions themselves to know the theory, they must
be able to practically detect threats of cyberattacks and be able to defend against them.
For this, it will help to use world best practices, tuned business processes, teamwork and
the introduction of modern technologies. This will minimize the likelihood of intrusion
into the operations of the bank or payment system, will allow stopping intruders in time,
eliminate harmful activity and quickly restore the financial service.
Cognitive models have been developed to determine the level of safety of the computer
network, information security system and banks. The suggested models allow to identify
the most important threats, in terms of studying this problem and to analyze the relative
change in the level of safety of the systems under study. The structural and topological
analysis of the built fuzzy cognitive maps has been carried out, the results of which testify
to their sufficient density, complexity and democracy. Concepts that have the highest
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 15 of 17
structural significance have been identified and scenario modeling has been carried out, as
a result of which, with the maximum positive impact of these concepts, it is determined
that the level of safety of the computer network security will increase by 65%, that of the
information security system by 32% and that of banks by 2%.
The results of this study give an opportunity to forecast the state of bank cybersecurity,
which in turn contributes to the implementation of the necessary mechanisms to prevent,
protect and control access at the appropriate levels of network infrastructure.
Author Contributions:
Conceptualization, O.S. and I.M.; methodology, I.Y.; software, M.K.; vali-
dation, O.S. and I.M.; formal analysis, V.N.; investigation, I.Y.; resources, V.N.; data curation, O.S.;
writing—original draft preparation, I.M.; writing—review and editing, M.K.; visualization, V.N.;
supervision, I.Y.; project administration, M.K.; and funding acquisition, I.Y. All authors have read
and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest.
References
1.
Kosko, B. Fuzzy cognitive maps. International journal of man-machine studies. Int. J. Man-Mach. Stud.
1986
,24, 65–75. [CrossRef]
2.
Bauer, S.; Bernroider, E.W.; Chudzikowski, K. Prevention is better than cure! Designing information security awareness programs
to overcome users’ non-compliance with information security policies in banks. Comput. Secur. 2017,68, 145–159. [CrossRef]
3.
Shamala, P.; Ahmad, R.; Zolait, A.; Sedek, M. Integrating information quality dimensions into information security risk
management (ISRM). J. Inf. Secur. Appl. 2017,36, 1–10. [CrossRef]
4. Hassani, H.; Huang, X.; Silva, E. Digitalisation and big data mining in banking. Big Data Cogn. Comput. 2018,2, 18. [CrossRef]
5.
Han, J.; Kim, Y.J.; Kim, H. An integrative model of information security policy compliance with psychological contract: Examining
a bilateral perspective. Comput. Secur. 2017,66, 52–65. [CrossRef]
6.
Bauer, S.; Bernroider, E.W. From information security awareness to reasoned compliant action: Analyzing information security
policy compliance in a large banking organization. ACM SIGMIS Database DATABASE Adv. Inf. Syst.
2017
,48, 44–68. [CrossRef]
7.
Ramachandran, M.; Chang, V. Towards performance evaluation of cloud service providers for cloud data security. Int. J. Inf.
Manag. 2016,36, 618–625. [CrossRef]
8. Jasmin, M.; Hemalatha, S.B. RFID security and privacy enhancement. Int. J. Pure Appl. Math. 2017,116, 535–539.
9.
Srinivas, J.; Das, A.K.; Kumar, N. Government regulations in cyber security: Framework, standards and recommendations. Future
Gener. Comput. Syst. 2019,92, 178–188. [CrossRef]
10. Salahdine, F.; Kaabouch, N. Social engineering attacks: A survey. Future Internet 2019,11, 89. [CrossRef]
11.
Ijaz, S.; Shah, M.A.; Khan, A.; Ahmed, M. Smart cities: A survey on security concerns. Int. J. Adv. Comput. Sci. Appl.
2016
,7,
612–625. [CrossRef]
12.
Jasmin, M.; Hemalatha, B. Security for industrial communication system using encryption/decryption modules. Int. J. Pure Appl.
Math. 2017,116, 563–568.
13.
Kiwia, D.; Dehghantanha, A.; Choo, K.K.R.; Slaughter, J. A cyber kill chain based taxonomy of banking Trojans for evolutionary
computational intelligence. J. Comput. Sci. 2018,27, 394–409. [CrossRef]
14.
Merhi, M.; Hone, K.; Tarhini, A. A cross-cultural study of the intention to use mobile banking between Lebanese and British
consumers: Extending UTAUT2 with security, privacy and trust. Technol. Soc. 2019,59, 101151. [CrossRef]
15.
Moody, G.D.; Siponen, M.; Pahnila, S. Toward a unified model of information security policy compliance. MIS Q.
2018
,42,
285–311. [CrossRef]
16.
Safa, N.S.; Von Solms, R. An information security knowledge sharing model in organizations. Comput. Hum. Behav.
2016
,57,
442–451. [CrossRef]
17.
Goel, S.; Williams, K.; Dincelli, E. Got phished? Internet security and human vulnerability. J. Assoc. Inf. Syst.
2017
,18, 2.
[CrossRef]
18.
Singh, S.; Srivastava, R.K. Predicting the intention to use mobile banking in India. Int. J. Bank Mark.
2018
,36, 357–378. [CrossRef]
19.
Lombardi, M.; Pascale, F.; Santaniello, D. EIDS: Embedded Intrusion Detection System using Machine Learning to Detect Attack
over the CAN-BUS. In Proceedings of the 30th European Safety and Reliability Conference and the 15th Probabilistic Safety
Assessment and Management Conference, Venice, Italy, 21–26 June 2020.
20. Sinclair-Desgagné, B. Measuring innovation and innovativeness: A data-mining approach. Qual. Quant. 2021. [CrossRef]
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 16 of 17
21.
Antonczak, L.; Burger-Helmchen, T. Being mobile: A call for collaborative innovation practices? Inf. Learn. Sci.
2021
,122, 360–382.
[CrossRef]
22.
Chhabra, R.N.; Prabhakaran, S. Sustainable response system building against insider-led cyber frauds in banking sector: A
machine learning approach. J. Financ. Crime 2022. [CrossRef]
23.
Chesbrough, H. To recover faster from Covid-19, open up: Managerial implications from an open innovation perspective. Ind.
Mark. Manag. 2020,88, 410–413. [CrossRef]
24.
Bogers, M.; Burcharth, A.; Chesbrough, H. Open innovation in Brazil: Exploring opportunities and challenges. Int. J. Innov.
2019
,
7, 178–191. [CrossRef]
25. Yun, J.J.; Zhao, X.; Jung, K.; Yigitcanlar, T. The culture for open innovation dynamics. Sustainability 2020,12, 5076. [CrossRef]
26.
Yun, J.J.; Kim, D.; Yan, M.R. Open innovation engineering—Preliminary study on new entrance of technology to market.
Electronics 2020,9, 791. [CrossRef]
27.
Nambisan, S.; Siegel, D.; Kenney, M. On open innovation, platforms, and entrepreneurship. Strateg. Entrep. J.
2018
,12, 354–368.
[CrossRef]
28.
Rauter, R.; Globocnik, D.; Perl-Vorbach, E.; Baumgartner, R.J. Open innovation and its effects on economic and sustainability
innovation performance. J. Innov. Knowl. 2019,4, 226–233. [CrossRef]
29.
Leckel, A.; Veilleux, S.; Dana, L.P. Local Open Innovation: A means for public policy to increase collaboration for innovation in
SMEs. Technol. Forecast. Soc. Chang. 2020,153, 119891. [CrossRef]
30.
Hameed, W.U.; Nisar, Q.A.; Wu, H.C. Relationships between external knowledge, internal innovation, firms’ open innovation
performance, service innovation and business performance in the Pakistani hotel industry. Int. J. Hosp. Manag.
2021
,92, 102745.
[CrossRef]
31.
Huggins, R.; Prokop, D.; Thompson, P. Universities and open innovation: The determinants of network centrality. J. Technol.
Transf. 2020,45, 718–757. [CrossRef]
32.
Singh, S.K.; Gupta, S.; Busso, D.; Kamboj, S. Top management knowledge value, knowledge sharing practices, open innovation
and organizational performance. J. Bus. Res. 2021,128, 788–798. [CrossRef]
33.
Hervas-Oliver, J.L.; Sempere-Ripoll, F.; Boronat-Moll, C. Technological innovation typologies and open innovation in SMEs:
Beyond internal and external sources of knowledge. Technol. Forecast. Soc. Chang. 2021,162, 120338. [CrossRef]
34.
Sun, Y.; Liu, J.; Ding, Y. Analysis of the relationship between open innovation, knowledge management capability and dual
innovation. Technol. Anal. Strateg. Manag. 2020,32, 15–28. [CrossRef]
35.
Sivam, A.; Dieguez, T.; Ferreira, L.P.; Silva, F.J. Key settings for successful open innovation arena. J. Comput. Des. Eng.
2019
,6,
507–515. [CrossRef]
36.
Lee, M.; Yun, J.J.; Pyka, A.; Won, D.; Kodama, F.; Schiuma, G.; Park, H.; Jeon, J.; Park, K.; Jung, K.; et al. How to respond to the
fourth industrial revolution, or the second information technology revolution? Dynamic new combinations between technology,
market, and society through open innovation. J. Open Innov. Technol. Mark. Complex. 2018,4, 21. [CrossRef]
37.
Grimaldi, M.; Greco, M.; Cricelli, L. A framework of intellectual property protection strategies and open innovation. J. Bus. Res.
2021,123, 156–164. [CrossRef]
38.
Cedarbaum, J.G.; Powell, B.A.; Freeman, D.R.; Schloss, L.; Abrahamson, R. New York finalizes cybersecurity regulations for
financial institutions. J. Investig. Compliance 2017,18, 27–30. [CrossRef]
39. Aldasoro, I.; Gambacorta, L.; Giudici, P.; Leach, T. The drivers of cyber risk. J. Financ. Stab. 2022,60, 100989. [CrossRef]
40.
Najaf, K.; Mostafiz, M.I.; Najaf, R. Fintech firms and banks sustainability: Why cybersecurity risk matters? Int. J. Financ. Eng.
2021,8, 2150019. [CrossRef]
41.
Kandasamy, K.; Srinivas, S.; Achuthan, K.; Rangan, V.P. IoT cyber risk: A holistic analysis of cyber risk assessment frameworks,
risk vectors, and risk ranking process. EURASIP J. Inf. Secur. 2020,1, 8. [CrossRef]
42.
Uddin, M.; Ali, M.; Hassan, M.K. Cybersecurity hazards and financial system vulnerability: A synthesis of literature. Risk Manag.
2020,22, 239–309. [CrossRef]
43. Soni, V.D. Role of Artificial Intelligence in Combating Cyber Threats in Banking. Int. Eng. J. Res. Dev. 2019,4, 7.
44.
Maharjan, R.; Chatterjee, J.M. Framework for Minimizing Cyber Security Issues in Banking Sector of Nepal. LBEF Res. J. Sci.
Technol. Manag. 2019,1, 82–98.
45.
Ali, L. Cyber crimes-A constant threat for the business sectors and its growth (A study of the online banking sectors in GCC).
J. Dev. Areas 2019,53, 267–279. [CrossRef]
46.
Yun, J.J.; Zhao, X.; Park, K.; Shi, L. Sustainability condition of open innovation: Dynamic growth of alibaba from SME to large
enterprise. Sustainability 2020,12, 4379. [CrossRef]
47.
Tajudin, M.M.; Musa, N.C. Issues and trends in open innovation amongst Malaysian fintech start-ups. Int. J. Acad. Res. Bus. Soc.
Sci. 2018,8, 1949–1964. [CrossRef]
48.
De Groote, J.K.; Backmann, J. Initiating open innovation collaborations between incumbents and startups: How can David and
Goliath get along? Int. J. Innov. Manag. 2020,24, 2050011. [CrossRef]
49.
Urbinati, A.; Chiaroni, D.; Chiesa, V.; Frattini, F. The role of digital technologies in open innovation processes: An exploratory
multiple case study analysis. RD Manag. 2020,50, 136–160. [CrossRef]
50.
Cepeda, J.; Arias-Pérez, J. Information technology capabilities and organizational agility: The mediating effects of open innovation
capabilities. Multinatl. Bus. Rev. 2019,27, 198–216. [CrossRef]
J. Open Innov. Technol. Mark. Complex. 2022,8, 80 17 of 17
51.
Scuotto, V.; Beatrice, O.; Valentina, C.; Nicotra, M.; di Gioia, L.; Briamonte, M.F. Uncovering the micro-foundations of knowledge
sharing in open innovation partnerships: An intention-based perspective of technology transfer. Technol. Forecast. Soc. Chang.
2020,152, 119906. [CrossRef]
52.
Tidd, J.; Bessant, J. Innovation management challenges: From fads to fundamentals. Int. J. Innov. Manag.
2018
,22, 1840007.
[CrossRef]
53. Brockman, P.; Khurana, I.K.; Zhong, R.I. Societal trust and open innovation. Res. Policy 2018,47, 2048–2065. [CrossRef]
54.
Zhu, X.; Xiao, Z.; Dong, M.C.; Gu, J. The fit between firms’ open innovation and business model for new product development
speed: A contingent perspective. Technovation 2019,86, 75–85. [CrossRef]
55.
Mosteanu, N.R. Artificial Intelligence and Cyber Security–A Shield against Cyberattack as a Risk Business Management Tool–Case
of European Countries. Qual. Access Success 2020,21, 148–156.
56.
Masucci, M.; Brusoni, S.; Cennamo, C. Removing bottlenecks in business ecosystems: The strategic role of outbound open
innovation. Res. Policy 2020,49, 103823. [CrossRef]
57.
Gomber, P.; Kauffman, R.J.; Parker, C.; Weber, B.W. On the fintech revolution: Interpreting the forces of innovation, disruption,
and transformation in financial services. J. Manag. Inf. Syst. 2018,35, 220–265. [CrossRef]
... In today's information-centric environment, establishing robust information protection systems is crucial given the escalating risks [29]. Achieving a balance between costeffectiveness and security is essential to mitigate potential interruptions that could cause socio-economic instability in the realm of digital banking [29] [30]. ...
... In today's information-centric environment, establishing robust information protection systems is crucial given the escalating risks [29]. Achieving a balance between costeffectiveness and security is essential to mitigate potential interruptions that could cause socio-economic instability in the realm of digital banking [29] [30]. Various evaluation techniques, such as fuzzy logic, ranking systems, and statistical analysis, provide valuable insights into information security [29]. ...
... Achieving a balance between costeffectiveness and security is essential to mitigate potential interruptions that could cause socio-economic instability in the realm of digital banking [29] [30]. Various evaluation techniques, such as fuzzy logic, ranking systems, and statistical analysis, provide valuable insights into information security [29]. Open banking technologies like electronic money and online services are indispensable for updating services, meeting client demands, and ensuring enhanced data security for safe and accessible financial transactions [29]. ...
... The digital age has transformed the banking industry, introduced innovative services and conveniences but also exposed it to unprecedented cybersecurity threats. Shulha et al. (2022) emphasize the critical role of cybersecurity in protecting banking information resources, highlighting the necessity for robust cybersecurity systems to safeguard against potential cyber threats. The study introduces a comprehensive approach to modeling banking information resource cybersecurity, underscoring the importance of predictive, protective, and responsive cybersecurity measures in the banking sector. ...
... The interconnectedness of today's financial systems and the rise of digital transactions amplify the potential risks and economic impacts of cyber breaches. Shulha et al. (2022) propose the use of functional cognitive models to assess the level of protection of banking systems, offering a methodological framework for predicting and responding to cyber threats. This approach underscores the need for a comprehensive understanding of cybersecurity dynamics to develop effective defense mechanisms. ...
... The significance of cybersecurity in modern banking systems cannot be overstated, as it plays a pivotal role in ensuring the security and integrity of financial transactions and customer data. Shulha et al. (2022), Fedotova et al. (2019), and Tariq (2018) collectively advocate for a unified approach to cybersecurity, involving collaboration among financial institutions, regulatory bodies, and customers. This approach is essential for developing resilient cybersecurity frameworks capable of withstanding the evolving landscape of cyber threats. ...
Article
Full-text available
In an era where the digital transformation of the banking sector intersects with the escalating complexity of cyber threats, this paper endeavors to dissect the multifaceted realm of cybersecurity within the banking industry. With a backdrop of increasing online banking adoption and the concomitant rise in cybercrime, the study aims to illuminate the current cybersecurity landscape, evaluate the efficacy of existing frameworks and propose strategic enhancements to fortify digital defenses. Employing a methodological amalgam of literature review and analysis of recent cybersecurity incidents, this investigation delves into the intricacies of cyber threats, the financial repercussions of breaches and the robustness of current cybersecurity measures in banking. The scope of this paper encompasses a comprehensive examination of recent cyber incidents, an assessment of the financial impact of cyber-attacks, an evaluation of the effectiveness of existing cybersecurity frameworks and the formulation of strategic recommendations for bolstering cybersecurity measures. Through this scholarly inquiry, key findings emerge, highlighting the critical need for dynamic cybersecurity strategies that integrate advanced technologies, promote regulatory compliance and foster a culture of cybersecurity awareness. Conclusively, the study posits that the banking sector must embrace a holistic and adaptive approach to cybersecurity, underscored by strategic investments in technology, education, and collaboration. Recommendations advocate for the integration of Big Data analytics, artificial intelligence and continuous risk assessment methodologies to navigate the evolving cyber threat landscape effectively. This paper serves as a clarion call to banking institutions, urging a reinvigorated commitment to cybersecurity resilience in safeguarding financial assets and customer trust against the backdrop of digital transformation.
... In today's information-centric environment, establishing robust information protection systems is crucial given the escalating risks [29]. Achieving a balance between costeffectiveness and security is essential to mitigate potential interruptions that could cause socio-economic instability in the realm of digital banking [29] [30]. ...
... In today's information-centric environment, establishing robust information protection systems is crucial given the escalating risks [29]. Achieving a balance between costeffectiveness and security is essential to mitigate potential interruptions that could cause socio-economic instability in the realm of digital banking [29] [30]. Various evaluation techniques, such as fuzzy logic, ranking systems, and statistical analysis, provide valuable insights into information security [29]. ...
... Achieving a balance between costeffectiveness and security is essential to mitigate potential interruptions that could cause socio-economic instability in the realm of digital banking [29] [30]. Various evaluation techniques, such as fuzzy logic, ranking systems, and statistical analysis, provide valuable insights into information security [29]. Open banking technologies like electronic money and online services are indispensable for updating services, meeting client demands, and ensuring enhanced data security for safe and accessible financial transactions [29]. ...
Preprint
Full-text available
In the banking industry, ransomware is a well-known threat, but since the beginning of 2022, cryptojacking, an emerging threat is posing a considerable challenge to the banking industry. Ransomware has variants, and the attackers keep changing the nature of these variants. This review paper studies the complex background of these two threats and scrutinizes the actual challenges, and problems that the banking industry and financial institutions face. These threats, though distinct in nature, share commonalities, such as financial motivations and sophisticated techniques. We focus on examining the newly emerged variants of ransomware while we provide a comprehensive idea of cryptojacking and its nature. This paper involves a detailed breakdown of the specific threats posed by cryptojacking and ransomware. It explores the techniques cybercriminals use, the variabilities they look for, and the potential consequences for financial institutions and their customers. This paper also finds out how cybercriminals change their techniques following the security upgrades, and why financial firms including banks need to be proactive about cyber threats. Additionally, this paper reviews the background study of some existing papers, finds the research gaps that need to be addressed, and provides suggestions including a conclusion and future scope on those disputes. Lastly, we introduce a Digital Forensics and Incident Response (DFIR) approach for up-to-date cyber threat hunting processes for minimizing both cryptojacking and ransomware attacks in the banking industry.
... Also, income estimates should take into account fluctuations in demand during the war and its changes during the reconstruction phase. The detailing of objects of risk-oriented strategic management accounting largely depends on the sector of the economy in which the business operates: transport services (Tarashevsky, 2020), agroindustrial complex (Fomina et al., 2020), construction, manufacturing, retail, tourism, medicine, financial system (Shulha et al., 2022) -each of them has its own characteristics. Therefore, the further description of risks as objects of strategic management accounting for individual sectors of the economy and types of activities can be a direction of prospective research. ...
... It is relevant to assess the effectiveness of responsibility centers in the management accounting system (Drobyazko et al., 2019), cyber risks and information technologies (Shulha et al., 2022). Foresight technologies, based on a combination of strategic analysis and forecasting of key indicators, provide a high probability of achieving certain results and contribute to the formation of conditions for this (Fomina et al., 2020). ...
Article
Full-text available
In order to survive, Ukrainian enterprises in the conditions of war must look for new ways of effective management, a higher degree of integration of risk management and strategic management. Management accounting helps make risk-based decisions to achieve strategic goals. The expert survey method made it possible to identify the most significant risks for enterprises in Ukraine in war conditions: the risk of increased costs, reduced income, the risk of inability to repay obligations, loss of customers, non-payment of receivables, loss of asset value, risk of unprofitability, reduction of business and bankruptcy. The strategic management accounting risk matrix shows the probability and potential impact of each risk on accounting data. A strategic plan and measurement of the effectiveness of risk-oriented strategic management accounting was developed. It shows the relationship of accounting objects, the financial statements of the enterprise, with analytical indicators for assessing the financial condition and the impact of risks under pessimistic, optimistic and optimal scenarios. In practice, it helps to identify risks, determine their impact on enterprise performance indicators, model indicators, assess their compliance with strategic goals, adapt in a timely manner, and make effective management decisions.
Chapter
The problematic reality in the current context of the traditional banking system is the lack of efficiency, accessibility and security faced by customers. Long queues, limited opening hours and cumbersome procedures at physical branches pose barriers for users, who find it difficult to access financial services conveniently and quickly. Faced with this problematic, digitization of the banking system has been proposed as a solution to address these challenges and improve the financial customer experience. The present research focuses on analyzing the important aspects about the digitization of the banking system written in the scientific literature between the years 2019 and 2023. The Prisma methodology was used, and the databases searched were ScienceDirect, Scopus and Scielo. Twenty-two articles were reviewed, following inclusion criteria such as publication between 2019 and 2023, languages in Spanish, English or Portuguese and open access. The results obtained indicate that the most used database is Sciencedirect and the year with the highest number of publications was 2022. Also, the digitization of the banking system helps to offer better and more secure services to customers. In addition, specific areas covered by this digitization include data, cybersecurity, accessibility, and inclusion. In conclusion, the digital transformation of the banking system has significantly improved the customer experience and paved the way for a more efficient, accessible, and secure financial landscape.
Article
Full-text available
The more sophisticated a technology, the more possible vulnerabilities that will arise during the use of that technology. Information systems require good management in order to run optimally. For each possible vulnerability, system managers must know how to prevent, reduce, avoid, or even accept the impacts that arise as a result of these vulnerabilities, so that system management is needed, which is often called risk management. Knowing the possible risks that arise in the implementation of this information system will make it easier for companies to form strategies and increase the success and sustainability of the organization's vision and mission.
Article
Full-text available
The banking and financial sector has always been a prime target for cyber threats due to the critical nature of the information they handle. With the increasing dependence on technology and digital transformation, the sector is facing more complex and sophisticated threats from cybercriminals. The banking sector serves as the backbone of a country’s economy, interlinked with various other sectors like petroleum, mining, health, and industry. Any significant damage to the banking sector can send shockwaves through the entire economic landscape. Therefore, cyber threat classifications play a crucial role in risk management and provide a valuable framework for understanding and responding to cyber threats. Understanding the potential impact of a cyber-attack helps organisations assess the risks they face and develop appropriate risk mitigation strategies. The purpose of this research paper is to provide a comprehensive analysis of cyber threats in the banking and financial sectors, including identifying common threats, their nature and character to help in classification. One of the significant contributions of this research paper is to classify cyber threats to the banking and financial sectors based on their severity and technicality. This classification helps to identify the appropriate countermeasures required to mitigate the risks of each type of threat. Furthermore, the paper explores the technical, non-technical, organizational countermeasures and the legal and regulatory measures used to protect financial transactions from cyber threats. This research work delves into the challenges and limitations of cyber threat classifications, focusing specifically on those confronting the banking and financial sector in their pursuit of robust cybersecurity. Additionally, it analyses recent trends and developments in the field, highlighting the evolving nature of cyber threats to banking. The most significant challenge is the rapidly evolving nature of cyber threats, making it challenging to keep up with the latest trends and technologies.
Article
Full-text available
Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit from the confidential information of organizations in the business sector. The objective of the research is to conduct a systematic review of the literature through articles published in databases such as Scopus and Dimension. Thus, in order to perform a complete documentary analysis, inclusion and exclusion criteria were applied to evaluate the quality of each article. Then, using a quantitative scale, articles were filtered according to author, period and country of publication, leaving a total of 86 articles from both databases. The methodology used was the one proposed by Kitchenham, and the conclusion reached was that the vast majority of companies do not make a major investment in the purchase of equipment and improvement of information technology (IT) infrastructure, exposing themselves to cyber-attacks that continue to grow every day. This research provides an opportunity for researchers, companies and entrepreneurs to consult so that they can protect their organization's most important assets.
Article
Full-text available
This paper aims in providing new technique to provide privacy and security.The parameters related to location will be considered for this.This information can be taken for defend measures to avoid unauthorized access.Secured schemes will be employed for transaction on server side.Our work focuses on using RFID tags with efficient sensing techniques.This methodology proves to be more secure as it is independent on man power and other devices.
Article
Full-text available
Despite substantial advances over the past decades, measuring innovation and innovativeness remains a challenge for both academic researchers and management practitioners. To address several key concerns with current indicators—such as their specialization and consequent one-sidedness, their frequent lack of theoretical foundations, and the fact that they may not really foster creativity and invention—this paper introduces some new metrics via one data-mining approach—formal concept analysis—which is increasingly used to represent and treat knowledge. This approach can adapt to particular needs and goals, incorporate various kinds of information (qualitative or quantitative) from different sources, and cope with several types of innovations. It also uncovers a logical route to novelty, which might enhance the generation of ideas and is used here to support the measurement of innovativeness.
Article
Full-text available
In the new and evolving digitalized world, the cybersecurity threats have placed the assets and information of corporations, institutions, governments, and individuals at constant risk. Banks are not an exception. Offering the low-interest rate is becoming the fundamental strategic move of the banks to sustain. Due to the high demand for a tailored portfolio of financial products, the availability of sophisticated communication and advance transaction mechanisms lead to an emergence of a new type of competitor known as financial technology service (i.e., fintech). The collaboration between these fintech organizations and banks has recently increased to provide fine-tuned service to the consumer and satisfy emerging market needs. However, this collaboration between banks and fintech firms has triggered significant cybersecurity risk. Hence, the dilemma is whether the bank should embrace such collaboration to resuscitate the profit margin or be pragmatic, and shirk to eliminate sustainability risk? We argue that the alliance between bank and fintech firms triggers a high-level of cybersecurity risk. We propose a theoretical model and discuss various types of cybersecurity risks. The benefit (or cost-if any) of having alliance could be enormous in yielding profitability and increase sustainability if both fintech and banks collaboratively abate the cybersecurity risks.
Article
Full-text available
While open innovation has been increasingly adopted in developed countries, firms from emerging markets such as Brazil markedly fall behind this trend. Our understanding of the reasons behind this phenomenon remains nevertheless limited, since most research focuses on the industrialized world. In this paper, we aim to inspire the academic community to investigate the issue of why companies from emerging economies such as Brazil have limited open innovation strategies, when they need to draw on external partners as to overcome the institutional, resource and capability constraints they are subject to. We build on the argument that latecomer firms in emerging economies need to actively use open innovation more than ever, as to overcome internal rigidities and spur the innovative resources and capabilities required for the digital transformation and for addressing grand societal challenges. In reviewing current research on openness and especially in the Brazilian setting, we contend that it is a relevant empirical context to study, giving the potential to uncover unique mechanisms and theoretical relations by asking (and possibly answering) novel research questions. Building on a conceptual framework that links various implementation levels of open innovation, we identify themes that are either less well researched or contested and thereby suggest challenges and opportunities for future research.
Article
Cyber incidents are becoming more sophisticated and their costs difficult to quantify. Using a unique database of cyber events across sectors in the US, we document the characteristics and drivers of cyber incidents. Cyber costs are higher for larger firms and for incidents that impact several organisations simultaneously. Events with malicious intent (i.e. cyber attacks) tend to be less costly, unless they are on the upper tail of the loss distribution. The financial sector is exposed to a larger number of cyber attacks but suffers lower costs, on average. The use of cloud services is associated with lower costs, especially when cyber incidents are relatively small. As cloud providers become systemically important, cloud dependence is likely to increase tail risks. Finally, we document that higher expenditure on IT is associated with future reduced costs from cyber incidents.
Preprint
Purpose This paper aims to focus on the different types of insider-led cyber frauds that gained mainstream attention in recent large-scale fraud events involving prominent Indian banking institutions. In addition to identifying and classifying cyber fraud, the study maps them on a severity scale for optimal mitigation planning. Design/methodology/approach The methodology used for identification and classification is an analysis of a detailed literature review, a focus group discussion with risk and vigilance officers and cyber cell experts, as well as secondary data of cyber fraud losses. Through machine learning-based random forest, the authors predicted the future of insider-led cyber frauds in the Indian banking business and prioritized and predicted the same. The projected future reveals the dominance of a few specific cyber frauds, which will make it easier to develop a fraud mitigation model based on a victim-centric approach. Findings The paper concludes with a conceptual framework that can be used to ensure a sustainable cyber fraud mitigation ecosystem within the scope of the study. By using the findings of this research, policymakers and fraud investigators will be able to create a more robust environment for banks through timely detection of cyber fraud and prevent it appropriately before it happens. Research limitations/implications The study focuses on fraud, risk and mitigation from a victim-centric perspective and does not address it from the fraudster’s perspective. Data availability was a challenge. Banks are recommended to compile data that can be used for analysis both by themselves and other policymakers. Practical implications The structured, sustainable cyber fraud mitigation suggested in the study will provide an agile, quick, proactive, stakeholder-specific plan that helps to safeguard banks, employees, regulatory authorities, customers and the economy. It saves resources, cost and time for bank authorities and policymakers. The mitigation measures will also help improve the reputational status of the Indian banking business and prolong the banks’ sustenance. Originality/value The innovative cyber fraud mitigation approach contributes to the sustainability of a bank’s ecosystem quickly, proactively and effectively.
Article
Purpose The purpose of this study is to examine mobile technology as being a key apparatus and interface for collaborative innovation, which allows organisations to develop their information ecology. Design/methodology/approach The qualitative research was performed by in-depth interviews, observations and field notes. The eight main interviews are supported by an interdisciplinary narrative literature review of knowledge management and associated fields. Findings This study validates the following propositions: mobile technology can offer users timely information, mobile technology can foster collaboration beyond physical and organisational boundaries, in general, mobile technology enables a wider amount of interactions between people. Thereby, this paper draws some implications about the knowledge management of creative (and non-creative) workers. Research limitations/implications The collected data sheds light on how organisations and individuals positioned themselves about mobile technology co-creative practices before the COVID era. Therefore, it shall be pertinent to further investigate these findings through a quantitative approach to better ascertain path models and to strengthen the new results with another qualitative perspective, in the post-COVID era. Practical implications The study highlights how mobile devices are facilitating collaborative innovation practices by improving management decisions, enabling new business and/or operating models, developing a flow of ideas inner/outer an organisation and fostering the ability to make innovation. Social implications Mobile technology transforms the way to work (knowledge creation and/or conversion) and it changes the relations between collaborators in a working environment (beyond physical boundaries). This study deciphers how a creative and/or decision-making person can change their work schedule and/or routines based on the use of mobile devices. Originality/value The added value of this transdisciplinary study is that it improves research on collaborative innovation and collective knowledge by revealing three pertinent characteristics of mobile technology: enabling quick decision; connecting with a glocal network and fostering collective creativity. It also creates a bridge between the fields of education and business.
Conference Paper
Nowadays, with the rapidly increasing of connected vehicles more and more cyber-attacks, which could compromise the driving experience, are possible. Indeed, connected vehicles are not able to guarantee the information security and shown their vulnerabilities in terms of Confidentiality, Integrity and Availability (CIA). These vulnerabilities advise the inefficiency of modern vehicles which, due to the advent of the Internet of Things paradigm, are equipped with many Internet access points. In this paper, we propose an approach based on Intrusion Detection System (IDS), which use a Machine Learning technique through Bayesian Networks approach to detect possible attacks on Controller Area Network Bus (CANBus). In this way, a framework, which takes advantage of an embedded system able to discover a non-linear messages flow on CAN-Bus, is presented.
Article
The purpose of this study is to test the relationships between external knowledge, internal innovation, firms’ open innovation performance, service innovation and business performance in the Pakistani hotel industry. A simple random sample of 285 managerial staff in the Pearl-Continental Hotels & Resorts of Pakistan was surveyed. The findings show that firms’ open innovation performance has a positive influence on service innovation and business performance. They also reveal that external knowledge and internal innovation positively influence firms’ open innovation performance and that further leads to service innovation and business performance respectively. This study provides practitioners with firms’ open innovation performance as a tool to enhance business performance while adopting the strategy.
Article
Adequate management of intellectual property (IP) is critical to sustaining competitive advantage and managing outbound open innovation (OI), which describes the inside-out flows of knowledge and technology. This article presents an IP strategic framework comprising the following strategies: a ‘defensive’ strategy, aimed at avoiding knowledge spillovers and building barriers to competition; a ‘collaborative’ strategy, aimed at collaborating with other organizations and entering new markets; and an ‘impromptu’ strategy, which describes firms protecting their IP without a clear purpose. We investigate the relationships of such IP strategies with outbound OI and innovation performance in 158 Italian firms. Most of them declared an impromptu IP strategy. We found that not having any IP protection strategy can be a barrier to outbound OI and that firms with a defensive IP strategy embraced outbound OI more than those declaring a collaborative IP strategy. Finally, firms with collaborative IP strategies outperformed those with defensive strategies.