268
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning

ORCID Icon &
Pages 876-906 | Received 23 Dec 2021, Accepted 24 Feb 2023, Published online: 20 Mar 2023

References

  • Abad-Segura, Emilio, Mariana-Daniela González-Zamar, Eloy López-Meneses, and Esteban Vázquez-Cano. 2020. “Financial Technology: Review of Trends, Approaches and Management.” Mathematics, doi:10.3390/math8060951.
  • Abawajy, Jemal. 2014. “User Preference of Cyber Security Awareness Delivery Methods.” Behaviour & Information Technology 33 (3): 237–248. doi:10.1080/0144929X.2012.708787.
  • Abdel-Galil, Rania E S. 2012. “Desert Reclamation, a Management System for Sustainable Urban Expansion.” Progress in Planning 78 (4): 151–206. doi:10.1016/j.progress.2012.04.003.
  • Abedin, Md.Thasinul, and Md. Muzammel Dawan. 2017. “A Panel Data Analysis for Evaluating the Profitability of the Banking Sector in Bangladesh.” Asian Journal of Economics and Empirical Research 3 (2): 163–171. doi:10.20448/journal.501/2016.3.2/501.2.163.171.
  • Addae, Joyce H., Xu Sun, Dave Towey, and Milena Radenkovic. 2019. Exploring User Behavioral Data for Adaptive Cybersecurity. User Modeling and User-Adapted Interaction. Vol. 29. Springer Netherlands. doi:10.1007/s11257-019-09236-5.
  • Adel, Heba, Mostafa ElBakary, Kamal ElDahshan, and Dina Salah. 2022. “BC-HRM: A Blockchain-Based Human Resource Management System Utilizing Smart Contracts.” In Lecture Notes in Networks and Systems. Vol. 309. doi:10.1007/978-3-030-84337-3_8.
  • Adewumi, Aderemi O, and Andronicus A Akinyelu. 2017. “A Survey of Machine-Learning and Nature-Inspired Based Credit Card Fraud Detection Techniques.” International Journal of System Assurance Engineering and Management 8 (2): 937–953. doi:10.1007/s13198-016-0551-y.
  • Adeyemo, K. A. 2012. “Frauds In Nigerian Banks: Nature, Deep-Seated Causes, Aftermaths And Probable Remedies.” Mediterranean Journal of Social Sciences` 3 (2): 279–289. doi:10.36941/mjss.
  • Aerts, Jeroen C.J.H., and W. J. Wouter Botzen. 2011. “Climate Change Impacts on Pricing Long-Term Flood Insurance: A Comprehensive Study for the Netherlands.” Global Environmental Change, doi:10.1016/j.gloenvcha.2011.04.005.
  • Agarwal, Nishant, and Meghna Sharma. 2014. “Fraud Risk Prediction in Merchant-Bank Relationship Using Regression Modeling.” Vikalpa 39 (3): 67–76. doi:10.1177/0256090920140305.
  • Ahram, Tareq, Arman Sargolzaei, Saman Sargolzaei, Jeff Daniels, and Ben Amaba. 2017. “Blockchain Technology Innovations.” In 2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017. doi:10.1109/TEMSCON.2017.7998367.
  • Akkeren, Jeanette Van, and Sherrena Buckby. 2017. “Perceptions on the Causes of Individual and Fraudulent Co-Offending: Views of Forensic Accountants.” Journal of Business Ethics 146 (2): 383–404. doi:10.1007/s10551-015-2881-0.
  • Albrecht, W. S., C. Albrecht, and C. C. Albrecht. 2008. “Current Trends in Fraud and Its Detection.” Information Security Journal: A Global Perspective 17 (1): 1–32. doi:10.1080/19393550801934331
  • Aldhyani, Theyazn H H, and Hasan Alkahtani. 2023. “Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model.” Mathematics 11 (1): 233. doi:10.3390/math11010233
  • Ali, Ahsan, Hongwei Wang, Mingchuan Gong, and Khalid Mehmood. 2023. “Conservation of Resources Theory Perspective of Social Media Ostracism Influence on Lurking Intentions.” Behaviour & Information Technology, January, 1–18. doi:10.1080/0144929X.2022.2159873.
  • Alleyne, P., N. Persaud, P. Alleyne, D. Greenidge, and P. Sealy. 2010. “Perceived Effectiveness of Fraud Detection Audit Procedures in a Stock and Warehousing Cycle, Additional Evidence from Barbados.” Managerial Auditing Journal 25 (6): 553–568. doi:10.1108/02686901011054863
  • Almendra, V. 2013. “Finding the Needle: A Risk-Based Ranking of Product Listings at Online Auction Sites for Non-Delivery Fraud Prediction.” Expert Systems with Applications 40 (12): 4805–4811. doi:10.1016/j.eswa.2013.02.027.
  • Anderson, Ross, Chris Barton, Rainer Böhme, Richard Clayton, Michel J.G. van Eeten, Michael Levi, Tyler Moore, and Stefan Savage. 2013. “Measuring the Cost of Cybercrime.” In The Economics of Information Security and Privacy, doi:10.1007/978-3-642-39498-0_12.
  • Antje, Hargarter, and Van Vuuren Gary. 2019. “Measuring Conduct Risk in South African Banks.” Qualitative Research in Financial Markets 11 (3): 282–304. doi:10.1108/QRFM-03-2018-0027.
  • Association of Certified Fraud Examiners. 2018. “Report to the Nation 2018 GLOBAL STUDY ON OCCUPATIONAL FRAUD AND ABUSE”.
  • Auty, Caroline. 2004. “Political Hacktivism: Tool of the Underdog or Scourge of Cyberspace?” Aslib Proceedings 56 (4): 212–221. doi:10.1108/00012530410549240.
  • Awoyemi, J. O., A. O. Adetunmbi, and S. A. Oluwadare. 2017. “Credit Card Fraud Detection Using Machine Learning Techniques: A Comparative Analysis.” In 2017 International Conference on Computing Networking and Informatics (ICCNI), 1–9. doi:10.1109/ICCNI.2017.8123782.
  • Baesens, Bart, Sebastiaan Höppner, and Tim Verdonck. 2021. “Data Engineering for Fraud Detection.” Decision Support Systems 150 (January), doi:10.1016/j.dss.2021.113492.
  • Balakrishnan, Vimala, Shahzaib Khan, and Hamid R. Arabnia. 2020. “Improving Cyberbullying Detection Using Twitter Users’ Psychological Features and Machine Learning.” Computers and Security 90: 101710. doi:10.1016/j.cose.2019.101710.
  • The Basel Committee on Banking Supervision. 2019. “Internal Fraud.” Open Risk Manual. 2019.
  • Batten, Sandra, Rhiannon Sowerbutts, and Misa Tanaka. 2017. “Let’s Talk About the Weather: The Impact of Climate Change on Central Banks.” SSRN Electronic Journal, 603. doi:10.2139/ssrn.2783753.
  • Beasley, Mark S, Joseph V Carcello, Dana R Hermanson, and Paul D Lapides. 2000. “Fraudulent Financial Reporting: Consideration of Industry Traits and Corporate Governance Mechanisms.” Accounting Horizons 14 (4): 441–454. doi:10.2308/acch.2000.14.4.441.
  • Ben-Asher, Noam, and Cleotilde Gonzalez. 2015. “Effects of Cyber Security Knowledge on Attack Detection.” Computers in Human Behavior 48: 51–61. doi:10.1016/j.chb.2015.01.039.
  • Bierstaker, J., R. G. Brody, and C. Pacini. 2006. “Accountants Perception Regarding Fraud Detection and Prevention Methods.” Managerial Auditing Journal 21 (5): 520–535. doi:10.1108/02686900610667283
  • Boyle, Douglas M, James F Boyle, and Daniel P Mahoney. 2018. “Behavioral Assessment and Modification in Fraud Mitigation Efforts.” Management Accounting Quarterly 20 (1): 1.
  • Braithwaite, John. 2010. “Diagnostics of White-Collar Crime Prevention.” Criminology & Public Policy 9 (3): 621–626. doi:10.1111/j.1745-9133.2010.00655.x.
  • Breiman, L. 2020. “Random Forests.” Machine Learning 45 (1): 5–32. doi:10.1023/A:1010933404324.
  • Brewer, Ross. 2015. “Cyber Threats: Reducing the Time to Detection and Response.” Network Security 2015 (5): 5–8. doi:10.1016/S1353-4858(15)30037-4.
  • Bui, Dieu Tien, Phuong-Thao Thi Ngo, Tien Dat Pham, Abolfazl Jaafari, Nguyen Quang Minh, Pham Viet Hoa, and Pijush Samui. 2019. “A Novel Hybrid Approach Based on a Swarm Intelligence Optimized Extreme Learning Machine for Flash Flood Susceptibility Mapping.” CATENA 179: 184–196. doi:10.1016/j.catena.2019.04.009.
  • Byington, J. R., and J. A. McGee. 2010. “White-Collar Crime: A Due Diligence Issue in India.” Journal of Corporate Accounting & Finance 21 (6): 9–15. http://doi.org/10.1002/jcaf.v21:6.
  • Carrizosa, Emilio, Cristina Molero-Río, and Dolores Romero Morales. 2021. “Mathematical Optimization in Classification and Regression Trees.” TOP 29 (1): 5–33. doi:10.1007/s11750-021-00594-1.
  • Çetinkaya, Ali Şükrü, and Arif Damar. 2019. “Psychological Resilience on Career Anchors.” Sosyal Ekonomik Araştırmalar Dergisi 19 (37): 80–98. doi:10.30976/susead.461957.
  • Chakrabarti, Gagari, and Chitrakalpa Sen. 2020. “Time Series Momentum Trading in Green Stocks.” Studies in Economics and Finance 37 (2): 361–389. doi:10.1108/SEF-07-2019-0269.
  • Chandrasekar, Addarsh, Abhilash Sunder Raj, and Poorna Kumar. 2015. Crime Prediction and Classification in San Francisco City. Sanfransico: Wiley.
  • Chassidim, Hadas, Christos Perentis, Eran Toch, and Bruno Lepri. 2021. “Between Privacy and Security: The Factors That Drive Intentions to Use Cyber-Security Applications.” Behaviour & Information Technology 40 (16): 1769–1783. doi:10.1080/0144929X.2020.1781259.
  • Chen, Houn-Gee, Charlie C Chen, Louis Lo, and Samuel C Yang. 2008. “Online Privacy Control via Anonymity and Pseudonym: Cross-Cultural Implications.” Behaviour & Information Technology 27 (3): 229–242. doi:10.1080/01449290601156817.
  • Chreptavičienė, Virginija, and Jovita Starkutė. 2012. “Relationship between Career and Competency: Verification of Theoretical Model Validity.” Engineering Economics 23 (2): 163–173. doi:10.5755/j01.ee.23.2.1539.
  • Cowen, Amanda P., and Jeremy J. Marcel. 2011. “Damaged Goods: Board Decisions to Dismiss Reputationally Compromised Directors.” Academy of Management Journal 54 (3): 509–527. doi:10.5465/AMJ.2011.61967992.
  • Cressey, D. 1953. Other People’s Money: A Study in the Social Psychology of Embezzlement. Glencoe: Free Press.
  • Cruz May, E., A. Bassam, Luis J. Ricalde, M. A. Escalante Soberanis, O. Oubram, O. May Tzuc, Alma Y. Alanis, and A. Livas-García. 2022. “Global Sensitivity Analysis for a Real-Time Electricity Market Forecast by a Machine Learning Approach: A Case Study of Mexico.” International Journal of Electrical Power & Energy Systems 135: 107505. doi:10.1016/j.ijepes.2021.107505.
  • Cummings, Adam, and Andrew P. Moore. 2012. “Insider Threat Study : Illicit Cyber Activity Involving Fraud in the U. S. Financial Services Sector”.
  • Davydov, Denis, and Steve Swidler. 2016. “Auditing Bank Financial Statements in Emerging Market Countries: The Use of the Benford Distribution.” In Risk Management in Emerging Markets, edited by Sabri Boubaker, Bonnie Buchanan, and Duc Khuong Nguyen, 187–200. Emerald Group Publishing Limited. doi:10.1108/978-1-78635-452-520161018.
  • Deilami, Kaveh, and Md. Kamruzzaman. 2017. “Modelling the Urban Heat Island Effect of Smart Growth Policy Scenarios in Brisbane.” Land Use Policy 64: 38–55. doi:10.1016/j.landusepol.2017.02.027.
  • Dimitrijevic, Dragomir, Vesna Milovanovic, and Vladimir Stancic. 2017. “The Role of A Company’s Internal Control System in Fraud Prevention.” E-Finanse 11 (3): 34–44. doi:10.1515/fiqf-2016-0117.
  • Doucette, Md Noor E Alam And John. 2010. “Stochastic Investment Decsison Making with Dynamic Programming.” In International Journal of Production Research, 25, 1–11. London: Mendeley Ltd.
  • Drew, J. M. 2020. “A Study of Cybercrime Victimisation and Prevention: Exploring the Use of Online Crime Prevention Behaviours and Strategies.” Journal of Criminological Research, Policy and Practice 6 (1): 17–33. doi:10.1108/JCRPP-12-2019-0070
  • Drew, Jacqueline M, and Lucy Farrell. 2018. “Online Victimization Risk and Self-Protective Strategies: Developing Police-Led Cyber Fraud Prevention Programs.” Police Practice and Research 19 (6): 537–549. doi:10.1080/15614263.2018.1507890.
  • Dusane, Palash Sandip, and Yallamandhala Pavithra. 2020. “Logic Bomb: An Insider Attack.” International Journal of Advanced Trends in Computer Science and Engineering 9 (3): 3662–3665. doi:10.30534/ijatcse/2020/176932020.
  • Dzomira, Shewangu. 2014. “Electronic Fraud (Cyber Fraud) Risk in the Banking Industry, Zimbabwe.” Risk Governance and Control: Financial Markets and Institutions 4 (2): 16–26. doi:10.22495/rgcv4i2art2.
  • Eaton, Tim V, and Sam Korach. 2016. “A Criminological Profile.” Journal of Applied Business Research 32 (1): 129–142. doi:10.19030/jabr.v32i1.9528
  • Ejarque-Gonzalez, Elisabet, and Andrea Butturini. 2014. “Self-Organising Maps and Correlation Analysis as a Tool to Explore Patterns in Excitation-Emission Matrix Data Sets and to Discriminate Dissolved Organic Matter Fluorescence Components.” Plos One 9 (6), doi:10.1371/journal.pone.0099618.
  • Fanai, Hosein, and Hossein Abbasimehr. 2023. “A Novel Combined Approach Based on Deep Autoencoder and Deep Classifiers for Credit Card Fraud Detection.” Expert Systems with Applications 217: 119562. doi:10.1016/j.eswa.2023.119562.
  • Farrugia, David, Christopher Zerafa, Tony Cini, Bruno Kuasney, and Karen Livori. 2021. “A Real-Time Prescriptive Solution for Explainable Cyber-Fraud Detection Within the IGaming Industry.” SN Computer Science 2 (3), doi:10.1007/s42979-021-00623-7.
  • Feily, Maryam, Alireza Shahrestani, and Sureswaran Ramadass. 2009. “A Survey of Botnet and Botnet Detection.” In Proceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009. doi:10.1109/SECURWARE.2009.48.
  • Ferracane, Martina Francesca. 2019. “Data Flows and National Security: A Conceptual Framework to Assess Restrictions on Data Flows Under GATS Security Exception.” Digital Policy, Regulation and Governance 21 (1): 44–70. doi:10.1108/DPRG-09-2018-0052.
  • Fijwala, Shivam, Marek Palasinski, and Neil Shortland. 2014. “The Basic Determinants of Perceived Increase in Violent, Sexual and Benefit Fraud Crimes.” Safer Communities 13 (4): 180–188. doi:10.1108/SC-07-2014-0010.
  • Fligstein, Neil, and Alexander F Roehrkasse. 2016. “The Causes of Fraud in the Financial Crisis of 2007 to 2009 : Evidence from the Mortgage-Backed Securities Industry.” American Sociological Review 81 (4): 617–643. doi:10.1177/0003122416645594.
  • Gao, Chen, Jian-Wen Shi, Zhaoyang Fan, Baorui Wang, Yao Wang, Chi He, Xinbo Wang, Jun Li, and Chunming Niu. 2018. “‘Fast SCR’ Reaction Over Sm-Modified MnOx-TiO2 for Promoting Reduction of NOx with NH3.” Applied Catalysis A: General 564: 102–112. doi:10.1016/j.apcata.2018.07.017.
  • Gartner. 2021. How Can You Protect Your Business and Customers from Online Fraud? New York: Gartner.
  • Geneletti, Davide, Daniele La Rosa, Marcin Spyra, and Chiara Cortinovis. 2017. “A Review of Approaches and Challenges for Sustainable Planning in Urban Peripheries.” Landscape and Urban Planning 165: 231–243. doi:10.1016/j.landurbplan.2017.01.013.
  • Geyser, J. M. 2004. “Weather Derivatives: Concept and Application for Their Use in South Africa.” Department of Agricultural Economics 43. doi:10.1080/03031853.2004.9523660.
  • Gheyas, Iffat A., and Ali E. Abdallah. 2016. “Detection and Prediction of Insider Threats to Cyber Security: A Systematic Literature Review and Meta-Analysis.” Big Data Analytics 1 (1), doi:10.1186/s41044-016-0006-0.
  • Gheyas, Iffat A., and Ali E. Abdallah. 2022. “Users in Crisis Response and Recovery: Catharsis and Social Learning among Social Media Users During and After a Natural Disaster.” Behaviour & Information Technology, 1–16. doi:10.1186/s41044-016-0006-0.
  • Günay, Aslı, Gülşen Töre Yargın, Sedef Süner-Pla-Cerdà, and Mert Kulaksız. 2022. “‘How Should My Family Assistant Be?’: Initial Perceptions About Prospective and Anticipated Use of in-Home Virtual Assistants in an Emerging Context.” Behaviour & Information Technology, 1–24. doi:10.1080/0144929X.2022.2054357.
  • Gupta, P. K., and Sanjeev Gupta. 2015. “Corporate Frauds in India - Perceptions and Emerging Issues.” Journal of Financial Crime 22 (1): 79–103. doi:10.1108/JFC-07-2013-0045.
  • Halbouni, Sawsan Saadi, Nada Obeid, and Abeer Garbou. 2016. “Corporate Governance and Information Technology in Fraud Prevention and Detection: Evidence from the UAE.” Managerial Auditing Journal 31 (6–7): 589–628. doi:10.1108/MAJ-02-2015-1163.
  • Harrison, Barry, and Winston Moore. 2012. “Forecasting Stock Market Volatility in Central and Eastern European Countries.” Journal of Forecasting 503 (February 2011): 490–503. doi:10.1002/for.1214
  • Haugen, S., and J. R. Selin. 1999. “Identifying and Controlling Computer Crime and Employee Fraud.” Journal: Industrial Management & Data Systems 99 (8): 340–344. doi:10.1108/02635579910262544
  • Heiman-Hoffman, V. B., K. P. Morgan, and J. M. Patton. 1996. “The Warning Sins of Fraudulent Financial Reporting.” Journal of Accountancy 182 (4): 75–89. Corpus ID: 221906144.
  • Hoffmann, Arvid O. I., Cornelia Birnbrich, and Cornelia Birnbrich. 2012. “Investigation in Retail Banking The Impact of Fraud Prevention on Bank-Customer Relationships An Empirical Investigation in Retail Banking”. doi:10.1108/02652321211247435.
  • Hwang, Jiyeon, Hwansoo Lee, Keesung Kim, Hangjung Zo, and Andrew P Ciganek. 2016. “Cyber Neutralisation and Flaming.” Behaviour & Information Technology 35 (3): 210–224. doi:10.1080/0144929X.2015.1135191.
  • Imgraben, James, Alewyn Engelbrecht, and Kim-Kwang Raymond Choo. 2014. “Always Connected, but Are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users.” Behaviour & Information Technology 33 (12): 1347–1360. doi:10.1080/0144929X.2014.934286.
  • India Brand Equity Foundation. 2019. “Banking Report: Global Vision.” https://www.ibef.org/download/banking-feb-2019.pdf.
  • Inkoom, Ebo, and Roine Leiringer. 2016. “Governance Units as Interstitial Organizations: The Role of Governance Organizations in the Development and Establishment of Building Environmental Assessment Methods (BEAM).” Proceedings of the 32nd Annual ARCOM Conference, ARCOM 2016 1 (September): 425–34.
  • International Finance Corporate. 2021. “Sustainable Banking and Finance Network.” SFN. 2021. https://www.ifc.org/wps/wcm/connect/topics_ext_content/ifc_external_corporate_site/sustainability-at-ifc/company-resources/sustainable-finance/sbn.
  • Jang-Jaccard, Julian, and Surya Nepal. 2014. “A Survey of Emerging Threats in Cybersecurity.” Journal of Computer and System Sciences 80 (5): 973–993. doi:10.1016/j.jcss.2014.02.005.
  • Jansson, K., and R. von Solms. 2013. “Phishing for Phishing Awareness.” Behaviour & Information Technology 32 (6): 584–593. doi:10.1080/0144929X.2011.632650.
  • Jenab, Kouroush, and Saeid Moslehpour. 2016. “Cyber Security Management: A Review.” Business Management Dynamics 5 (11): 16–39.
  • Kemp, Steven, Fernando Miró-Llinares, and Asier Moneva. 2020. “The Dark Figure and the Cyber Fraud Rise in Europe: Evidence from Spain.” European Journal on Criminal Policy and Research 26 (3): 293–312. doi:10.1007/s10610-020-09439-2.
  • Kesaya. 2022. “10 Phishing Facts: Employee Behavior & Insider Risk.” Agent. 2022.
  • Khanna, Ashu, and Bindu Arora. 2009. “A Study to Investigate the Reasons for Bank Frauds and the Implementation of Preventive Security Controls in Indian Banking Industry.” International Journal of Business Science and Applied Management 4 (3): 1–21. http://hdl.handle.net/10419/190606.
  • Khosravi, Khabat, Himan Shahabi, Binh Thai Pham, Jan Adamowski, Ataollah Shirzadi, Biswajeet Pradhan, Jie Dou, et al. 2019. “A Comparative Assessment of Flood Susceptibility Modeling Using Multi-Criteria Decision-Making Analysis and Machine Learning Methods.” Journal of Hydrology 573: 311–323. doi:10.1016/j.jhydrol.2019.03.073.
  • Kim, Won, Ok Ran Jeong, Chulyun Kim, and Jungmin So. 2011. “The Dark Side of the Internet: Attacks, Costs and Responses.” In Information Systems 36. doi:10.1016/j.is.2010.11.003.
  • Kimpe, Lies De, Michel Walrave, Pieter Verdegem, and Koen Ponnet. 2022. “What We Think We Know about Cybersecurity: An Investigation of the Relationship between Perceived Knowledge, Internet Trust, and Protection Motivation in a Cybercrime Context.” Behaviour & Information Technology 41 (8): 1796–1808. doi:10.1080/0144929X.2021.1905066.
  • KPMG. 2012. “Financial Report Crime Survey- Indian Fraud Survey 2012.” India.
  • KPMG. 2019. “Global Banking Fraud Survey-The Multi-Faceted Threat of Fraud: Are Banks up to the Challenge?” USA.
  • Krishnamurti, Chandrasekhar, Gang Tian, and Guangchuan Li. 2013. “No News Is Not Good News : Evidence from the Intra-Day Return Volatility – Volume Relationship in Shanghai Stock Exchange.” Journal of the Asia Pacific Economy 18 (1): 149–167. doi:10.1080/13547860.2012.742709
  • Kshetri, Nir. 2005. “Pattern of Global Cyber War and Crime: A Conceptual Framework.” Journal of International Management 11 (4): 541–562. doi:10.1016/j.intman.2005.09.009.
  • Kshetri, Nir. 2016. “Cybercrime and Cybersecurity in India: Causes, Consequences and Implications for the Future.” Crime, Law and Social Change 66 (3): 313–338. doi:10.1007/s10611-016-9629-3.
  • Ku, Yungchang, Yuchi Chen, and Chaochang Chiu. 2007. “A Proposed Data Mining Approach for Internet Auction Fraud Detection BT - Intelligence and Security Informatics.” In edited by Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, and Hsinchun Chen, 238–243. Berlin, Heidelberg: Springer Berlin Heidelberg.
  • Lacey, David, Sigi Goode, Jerry Pawada, and Dennis Gibson. 2020. “The Application of Scam Compliance Models to Investment Fraud Offending.” Journal of Criminological Research, Policy and Practice 6 (1): 65–81. doi:10.1108/JCRPP-12-2019-0073.
  • Lennox, J., and G. Turner. 2004. “State of the Environment Report on Human Settlements: Stocks and Flows Indicators, Technical Report CSIRO Sustainable Ecosystems. Prepared for the 2006 Australian State of the Environment Committee”.
  • Lessmann, Stefan, Bart Baesens, Hsin-Vonn Seow, and Lyn C Thomas. 2015. “Benchmarking State-of-the-Art Classification Algorithms for Credit Scoring: An Update of Research.” European Journal of Operational Research 247 (1): 124–136. doi:10.1016/j.ejor.2015.05.030.
  • Leukfeldt, E. Rutger, Anita Lavorgna, and Edward R. Kleemans. 2017. “Organised Cybercrime or Cybercrime That Is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime.” European Journal on Criminal Policy and Research 23 (3): 287–300. doi:10.1007/s10610-016-9332-z.
  • Leukfeldt, Eric Rutger, and Majid Yar. 2016. “Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis.” Deviant Behavior 37 (3): 263–280. doi:10.1080/01639625.2015.1012409.
  • Li, Zhoulin, Hao Zhang, Mohammad Masum, Hossain Shahriar, and Hisham Haddad. 2020. “Cyber Fraud Prediction with Supervised Machine Learning Techniques.” ACMSE 2020 - Proceedings of the 2020 ACM Southeast Conference, 176–80. doi:10.1145/3374135.3385296.
  • Liaw, A., and M. Wiener. 2002. “Classification and Regression by RandomForest.” R News 2 (3): 18–22.
  • Lin, Kan-Min. 2015. “Predicting Asian Undergraduates’ Intention to Continue Using Social Network Services from Negative Perspectives.” Behaviour & Information Technology 34 (9): 882–892. doi:10.1080/0144929X.2015.1027736.
  • Lin, Kan-Min. 2016. “Understanding Undergraduates’ Problems from Determinants of Facebook Continuance Intention.” Behaviour & Information Technology 35 (9): 693–705. doi:10.1080/0144929X.2016.1177114.
  • Lindsay, Jon Randall. 2017. “Restrained by Design: The Political Economy of Cybersecurity.” Digital Policy, Regulation and Governance 19 (6): 493–514. doi:10.1108/DPRG-05-2017-0023.
  • Lisa, Jack. 2019. “Collective Action and UK Wine Investment Fraud.” Qualitative Research in Financial Markets 12 (1): 118–136. doi:10.1108/QRFM-11-2018-0126.
  • Lodhia, Sumit, and Nicole Angela Mitchell. 2022. “Corporate Social Responsibility Disclosures and Reputation Risk Management Post the Banking Royal Commission: A Study of the Big Four Banks.” Qualitative Research in Accounting & Management 19 (2): 162–185. doi:10.1108/QRAM-07-2020-0120.
  • Ma, Katelyn Wan Fei, and Tammy McKinnon. 2022. “COVID-19 and Cyber Fraud: Emerging Threats During the Pandemic.” Journal of Financial Crime 29 (2): 433–446. doi:10.1108/JFC-01-2021-0016.
  • Mahajan, Vijay, and Jeet Singh. 2022. “Lives, Livelihoods and Environment: The Challenge of Sustainable Development Goals in India.” Financial Crises, Poverty and Environmental Sustainability: Challenges in the Context of the SDGs and Covid-19 Recovery, 93–105. doi:10.1007/978-3-030-87417-9_7
  • Marliana, Abdullah, Shahimi Shahida, and Ghafar Ismail Abdul. 2011. “Operational Risk in Islamic Banks: Examination of Issues.” Edited by Omar Masood.” Qualitative Research in Financial Markets 3 (2): 131–151. doi:10.1108/17554171111155366.
  • Marlin, T., and S. Jarrall. 2016. “Surveillance and Behavioral Analytics: A Match Made in Heaven.” Journal of Internet Law Oct 2016 20 (4): 1–11.
  • Martens, Marijn, Ralf De Wolf, and Lieven De Marez. 2019. “Investigating and Comparing the Predictors of the Intention Towards Taking Security Measures Against Malware, Scams and Cybercrime in General.” Computers in Human Behavior 92: 139–150. doi:10.1016/j.chb.2018.11.002
  • Martin, Nigel, John Rice, and Robin Martin. 2016. “Expectations of Privacy and Trust: Examining the Views of IT Professionals.” Behaviour & Information Technology 35 (6): 500–510. doi:10.1080/0144929X.2015.1066444.
  • Mc Donald, Robert, and Daniel Siegal. 2002. “The Value of Waiting to Invest”.
  • Melecky, Martin, and Anca Maria Podpiera. 2012. “Macroprudential Stress-Testing Practices of Central Banks in Central and Southeastern Europe: Comparison and Challenges Ahead.” Emerging Markets Finance and Trade 48 (4): 118–134. doi:10.2753/REE1540-496X480407.
  • Mohd, Zuraidah, Mohd Nor, Firdaus Rameli, and Yusarina Mat. 2015. “Fraud Schemes in the Banking Institutions : Prevention Measures to Avoid Severe Financial Loss.” Procedia Economics and Finance 28 (April): 107–113. doi:10.1016/S2212-5671(15)01088-6.
  • Morais, Sarmento Elsa de, and Hussein Khaled. 2017. “Making PPPs Work for the Poor: PPPs at the African Development Bank.” In The Emerald Handbook of Public–Private Partnerships in Developing and Emerging Economies, edited by João Leitão, Elsa de Morais Sarmento, and João Aleluia, 247–265. Emerald Publishing Limited. doi:10.1108/978-1-78714-493-420171009.
  • Mousavi, Reza, Bidyut Hazarika, Kuanchin Chen, and Thomas Rienzo. 2022. “The Role of Dissonance Reduction and Co-Creation Strategies in Shaping Smart Service Satisfaction – the Case of Uber.” Behaviour & Information Technology 41 (1): 51–71. doi:10.1080/0144929X.2020.1795258.
  • Murphy, Kristina, Ben Bradford, Elise Sargeant, and Adrian Cherney. 2022. “Building Immigrants’ Solidarity with Police: Procedural Justice, Identity and Immigrants’ Willingness to Cooperate with Police.” The British Journal of Criminology 62 (2): 299–319. doi:10.1093/bjc/azab052
  • Murphy, Pamela R., and M. Tina Dacin. 2011. “Psychological Pathways to Fraud: Understanding and Preventing Fraud in Organizations.” Journal of Business Ethics 101 (4): 601–618. doi:10.1007/s10551-011-0741-0.
  • Mustapha, Saidi. 2018. “E-Payment Technology Effect on Bank Performance in Emerging Economies–Evidence from Nigeria.” Journal of Open Innovation: Technology, Market, and Complexity 4 (4): 43. doi:10.3390/joitmc4040043.
  • Najafabadi, Maryam M., Flavio Villanustre, Taghi M. Khoshgoftaar, Naeem Seliya, Randall Wald, and Edin Muharemagic. 2015. “Deep Learning Applications and Challenges in Big Data Analytics.” Journal of Big Data 2 (1), doi:10.1186/s40537-014-0007-7.
  • Nakagawa, Ryuichi. 2022. “Bank Herding in Loan Markets: Evidence from Geographical Data in Japan.” International Review of Finance 22 (1): 72–89. doi:10.1111/irfi.12341
  • Nawaf, Liqaa F., Chaminda Hewage, and Fiona Carroll. 2022. “Minimization of Cyber Security Threats Caused by COVID-19 Pandemic.” In Lecture Notes in Networks and Systems 235. doi:10.1007/978-981-16-2377-6_40.
  • Nikolina Cveticanin. 2022. “Hacking Statistics to Give You Nightmares.” DataProt. 2022.
  • Noor-E-Alam, M., and John Doucette. 2010. “Stochastic Investment Decision Making with Dynamic Programming.” Iieom.Org, no. 2009. http://www.iieom.org/paper/Final Paper for PDF/245 Alam-Doucette.pdf.
  • Nzeadibe, T. C., R. N. C. Anyadike, and R. F. Njoku-Tony. 2012. “A Mixed Methods Approach to Vulnerability and Quality of Life Assessment of Waste Picking in Urban Nigeria.” Applied Research in Quality of Life 7 (4): 351–370.
  • Oana, Petrov Laura, Shahumyan Harutyun, Williams Brendan, and Convery Sheila. 2011. “Scenarios and Indicators Supporting Urban Regional Planning.” Procedia - Social and Behavioral Sciences 21: 243–252. doi:10.1016/j.sbspro.2011.07.012.
  • Okello Candiya Bongomin, George, and Joseph Mpeera Ntayi. 2020. “Mobile Money Adoption and Usage and Financial Inclusion: Mediating Effect of Digital Consumer Protection.” Digital Policy, Regulation and Governance 22 (3): 157–176. doi:10.1108/DPRG-01-2019-0005.
  • Omar, Mastura, Anuar Nawawi, and Ahmad Saiful Azlin Puteh Salin. 2016. “The Causes, Impact and Prevention of Employee Fraud: A Case Study of an Automotive Company.” Journal of Financial Crime 23 (4): 1012–1027. doi:10.1108/JFC-04-2015-0020.
  • Park, Hyoungkun, and Jong Dae Kim. 2020. “Transition Towards Green Banking: Role of Financial Regulators and Financial Institutions.” Asian Journal of Sustainability and Social Responsibility 5 (1): 5. doi:10.1186/s41180-020-00034-3.
  • Petrus, Marais, and Ostwalt Phillip. 2016. “Global Profiles of the Fraudster :Technology Enables and Weak Controls Fuel the Fraud”.
  • Pradhan, Radhe S, and Deepa Shrestha. 2019. “Impact of Liquidity on Profitability in Nepalese Commercial Bank.” Patan Pragya 5 (1): 180–187. doi:10.3126/pragya.v5i1.30458.
  • Protiviti. 2019. “TODAY ‘ S FINANCE PRIORITIES : SECURITY, DATA, ANALYTICS”.
  • Protiviti- Face the future with confidence. 2017. “Enhancing Security & Privacy in Financial Services Firms.” USA.
  • Rahman, Rashidah Abdul, and Irda Syahira Khair Anwar. 2014. “Effectiveness of Fraud Prevention and Detection Techniques in Malaysian Islamic Banks.” Procedia - Social and Behavioral Sciences 145: 97–102. doi:10.1016/j.sbspro.2014.06.015.
  • Ramamoorti, Sridhar, David E. Morrison, Joseph W. Koletar, and Kelly R. Pope. 2013. “Fraud Is Everywhere.” A.B.C.’s of Behavioral Forensics. Wiley Online Books. doi:10.1002/9781118740422.ch1.
  • Resnik, David B., and Peter R. Finn. 2018. “Ethics and Phishing Experiments.” Science and Engineering Ethics 24 (4): 1241–1252. doi:10.1007/s11948-017-9952-9.
  • Reurink, Arjan. 2018. “Financial Fraud : A Literature Review.” Journal of Economic Surveys 32 (5): 1–34. doi:10.1111/joes.12294.
  • Rohit, Bansal, Singh Arun, Kumar Sushil, and Gupta Rajni. 2018. “Evaluating Factors of Profitability for Indian Banking Sector: A Panel Regression.” Asian Journal of Accounting Research 3 (2): 236–254. doi:10.1108/AJAR-08-2018-0026.
  • Roy, N. C. 2021. “Banks and Their Technology Investment Decision Are Aligned or Not – an Experience of Indian Banks.” Journal of Facilities Management 19 (1): 1–20. doi:10.1108/jfm-04-2020-0020.
  • Roy, N. C., and Sankarshan Basu. 2021. “Bank’s Battle Against Insider Frauds Ignitors and Mitigators: An Emerging Nation Experience.” Journal of Facilities Management 19 (4): 437–457. doi:10.1108/JFM-04-2020-0021.
  • Roy, N. C., and Sreeleakha Prabhakaran. 2022a. “Internal-Led Cyber Frauds in Indian Banks: An Effective Machine Learning–Based Defense System to Fraud Detection, Prioritization and Prevention.” Aslib Journal of Information Management Ahead-of-p (Ahead-of-Print), doi:10.1108/AJIM-11-2021-0339.
  • Roy, N. C., and Sreeleakha Prabhakaran. 2022b. “Sustainable Response System Building Against Insider-Led Cyber Frauds in Banking Sector: A Machine Learning Approach.” Journal of Financial Crime Ahead-of-p (Ahead-of-Print), doi:10.1108/JFC-12-2021-0274.
  • Roy, N. C., and N. G. Roy. 2022. “Life Insurance Industry Agent’s Attrition: A Game Changer for Insurance Business.” Global Business Review 23 (2): 426–439. doi:10.1177/0972150919861452.
  • Roy, N. C., and T. Vishwanathan. 2018a. “Impact of Technological Disruption on Workforce Challenges of Indian Banks -Identification, Assessment & Mitigation.” Mumbai. http://www.iibf.org.in/documents/Final-161118.pdf.
  • Roy, N. C., and T. Vishwanathan. 2018b. “Workforce Challenges in Indian Banking Scenario - Journey from Identification Till Mitigation.” Current Science 115 (4), doi:10.18520/cs/v115/i4/739-747.
  • Roy, N. C., and T. Vishwanathan. 2021. “Dynamic Interaction of Urban Development and RuralUrban Migration: An Application of Integrated Urban Metabolism Analysis Tool for Sustainable City Planning.” Digital Policy, Regulation and Governance, doi:10.1108/DPRG-06-2020-0085.
  • Roy, N. C., and Thangaraj Viswanathan. 2020. “Investment in Technology: Does It Proliferate the Profitability and Performance of the Indian Banks?” In Financial Issues in Emerging Economies: Special Issue Including Selected Papers from II International Conference on Economics and Finance, 2019, Bengaluru, India, edited by Rita Biswas, and Michael Michaelides, 36:19–44. Research in Finance. Emerald Publishing Limited. doi:10.1108/S0196-382120200000036002.
  • Said, J., N. Omar, M. Rafidi, and S. N. S. Yusof. 2018. “Are Organizational Factors More Prevailing Than Individual Factors in Mitigating Employee Fraud? Findings from Royal Custom Officers.” Journal of Financial Crime 25 (3): 907–922. doi:10.1108/JFC-09-2017-0087.
  • Saravanan, S., S. Kannan, and C. Thangaraj. 2012. “Forecasting India’s Electricity Demand Using Artificial Neural Network.” IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 II: 79–83.
  • Sharma, Manoj. 2019. “Frauds on the Rise! ICICI, SBI, HDFC among Top 3 Banks to Report Highest Number of Frauds in 11 Years.” Business Today 2019: 11.
  • Shin, Bongsik, and Paul Benjamin Lowry. 2020. “A Review and Theoretical Explanation of the ‘Cyberthreat-Intelligence (CTI) Capability’ That Needs to Be Fostered in Information Security Practitioners and How This Can Be Accomplished.” Computers & Security 92: 1–16.
  • Sillence, Elizabeth, Jordan A Dawson, Kerry McKellar, and Nick Neave. 2022. “How Do Students Use Digital Technology to Manage Their University-Based Data: Strategies, Accumulation Difficulties and Feelings of Overload?” Behaviour & Information Technology, October, 1–10. doi:10.1080/0144929X.2022.2126948.
  • Singh, Malvika, B. M. Mehtre, and S. Sangeetha. 2022. “User Behavior Based Insider Threat Detection Using a Multi Fuzzy Classifier.” Multimedia Tools and Applications, doi:10.1007/s11042-022-12173-y.
  • Siregar, Sylvia Veronica, and Bayu Tenoyo. 2015. “Fraud Awareness Survey of Private Sector in Indonesia.” Journal of Financial Crime 22 (3): 329–346. doi:10.1108/JFC-03-2014-0016.
  • Smith, Stephen, Donald Winchester, Deborah Bunker, and Rodger Jamieson. 2010. “Circuits of Power: A Study of Mandated Compliance to an Information Systems Security de Jure Standard in a Government Organization.” MIS Quarterly: Management Information Systems 34 (SPEC. ISSUE 3), doi:10.2307/25750687.
  • State Bank of India. 2022. “NoFinancial Data of over 9M Cardholders Leaked, Including from SBI.” The Economic Times, 2022.
  • Steinmeier, Maria. 2016. “Fraud in Sustainability Departments? An Exploratory Study.” Journal of Business Ethics 138 (3): 477–492. doi:10.1007/s10551-015-2615-3.
  • Sunrise, Winter Jenifer, and Davidson Elizabeth. 2019. “Governance of Artificial Intelligence and Personal Health Information.” Digital Policy, Regulation and Governance 21 (3): 280–290. doi:10.1108/DPRG-08-2018-0048.
  • Survey, Privacy, and Adam Hamm. 2017. “Enhancing Security & Privacy in Financial Services Firms”.
  • Taniguchi, M., M. Haft, J. Hollmen, and V. Tresp. 1998. “Fraud Detection in Communication Networks Using Neural and Probabilistic Methods.” In Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP ‘98 (Cat. No.98CH36181), 2:1241–44 vol.2. doi:10.1109/ICASSP.1998.675496.
  • Temple, William G, Yue Wu, Carmen Cheh, Yuan Li, Binbin Chen, Zbigniew T Kalbarczyk, William H Sanders, and David Nicol. 2023. “CyberSAGE: The Cyber Security Argument Graph Evaluation Tool.” Empirical Software Engineering 28 (1): 18. doi:10.1007/s10664-021-10056-8
  • Tsai, Jeffrey J.P., and Philip S. Yu. 2009. “Machine Learning in Cyber Trust: Security, Privacy, and Reliability.” Machine Learning in Cyber Trust: Security, Privacy, and Reliability, 1–362. doi:10.1007/978-0-387-88735-7.
  • Uchenna, C., and J. C. Agbo. 2013. “Impact of Fraud and Fraudulent Practices on the Performance of Banks in Nigeria.” British Journal of Arts and Social Sciences 15 (1): 12–28.
  • Udeh, Sergius Nwannebuike, and James Ike Ugwu. 2018. “Fraud in Nigerian Banking Sector An Evaluation of the Effect of External Debt on Economic Growth Indices in Nigeria View Project.” International Journal of Academic Research in Business and Social Sciences 8 (5): 589–607. doi:10.6007/IJARBSS/v8-i5/4159.
  • Walker, Benjamin R., and Chris J. Jackson. 2017. “Moral Emotions and Corporate Psychopathy: A Review.” Journal of Business Ethics 141 (4): 797–810. doi:10.1007/s10551-016-3038-5.
  • Watson, Geoff. 2002. “E-mail Surveillance in the UK Workplace – a Management Consulting Case Study.” Aslib Proceedings 54 (1): 23–40. doi:10.1108/00012530210426266.
  • Watts, Nick, Markus Amann, Nigel Arnell, Sonja Ayeb-Karlsson, Kristine Belesova, Helen Berry, Timothy Bouley, Maxwell Boykoff, Peter Byass, and Wenjia Cai. 2018. “The 2018 Report of the Lancet Countdown on Health and Climate Change: Shaping the Health of Nations for Centuries to Come.” The Lancet 392 (10163): 2479–2514. doi:10.1016/S0140-6736(18)32594-7
  • Weber, Olaf. 2012. “Environmental Credit Risk Management in Banks and Financial Service Institutions.” Business Strategy and the Environment 21 (4): 248–263. doi:10.1002/bse.737.
  • Whitty, Monica T. 2019. “Predicting Susceptibility to Cyber-Fraud Victimhood.” Journal of Financial Crime 26 (1): 277–292. doi:10.1108/JFC-10-2017-0095.
  • Wortmeier, Ann-Kathrin, Aimée Sousa Calepso, Cordula Kropp, Michael Sedlmair, and Daniel Weiskopf. 2023. “Configuring Augmented Reality Users: Analysing YouTube Commercials to Understand Industry Expectations.” Behaviour & Information Technology, January, 1–16. doi:10.1080/0144929X.2022.2163693.
  • Yamin, Muhammad Mudassar, Basel Katt, and Vasileios Gkioulos. 2020. “Cyber Ranges and Security Testbeds: Scenarios, Functions, Tools and Architecture.” Computers & Security 88: 101636. doi:10.1016/j.cose.2019.101636.
  • Yazdi, Shiva Houshmand, Y. Yang, J. Lindqvist, A. Oulasvirta, Lejla Vrazalic, Per Thorsheim, Security Advisor, et al. 2014. “Passwords Aren ‘ t Broken : The Authentication System Is.” ArXiv Prepr. ArXiv1403 7 (2): 1–4. http://www.bath.ac.uk/research/liw/resources/Models and principles of Activity Theory.pdf%5Cnhttp://dl.acm.org/citation.cfm?id=1132736.1132768%5Cnhttp://www.scopus.com/inward/record.url?eid=2-s2.0-84872105946&partnerID=40&md5=d7d27df59064aa3cef4c024d5485e.
  • Yazid, Helmi, and Tulus Suryanto. 2017. “IFRS, Professional Auditor Skepticism, Conflict Agency to Prevention of Fraud and Investor Confidence Level.” International Journal of Economic Perspectives 11 (1): 250–259.
  • Yoo, Soonduck. 2017. “Blockchain Based Financial Case Analysis and Its Implications.” Asia Pacific Journal of Innovation and Entrepreneurship 11 (3): 312–321. doi:10.1108/APJIE-12-2017-036.
  • Ziegenfuss, D. E. 1996. “State and Local Government Fraud Survey for 1995.” Managerial Auditing Journal 9 (November): 49.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.