Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning.

Bibliographic Details
Title: Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning.
Authors: Roy, Neha Chhabra1 (AUTHOR) Nehang201112@gmail.com, Prabhakaran, Sreeleakha1 (AUTHOR)
Source: Behaviour & Information Technology. Apr2024, Vol. 43 Issue 5, p876-906. 31p.
Subject Terms: *Banking laws, *Corruption, *Organizational behavior, *Risk assessment, *Data security, *Computers, *Focus groups, *Data security failures, *Interviewing, *Debt, *Questionnaires, *Artificial intelligence, *Identity theft, *Security systems, *Financial stress, *Job stress, *Artificial neural networks, *Algorithms, Fraud prevention, Random forest algorithms, Logistic regression analysis, Research methodology, Conceptual structures, Machine learning
Geographic Terms: India
Abstract: This paper explores the different insider employee-led cyber frauds (IECF) based on the recent large-scale fraud events of prominent Indian banking institutions. Examining the different types of fraud and appropriate control measures will protect the banking industry from fraudsters. In this study, we identify and classify Cyber Fraud (CF), map the severity of the fraud on a scale of priority, test the mitigation effectiveness, and propose optimal mitigation measures. The identification and classification of CF losses were based on a literature review and focus group discussions with risk and vigilance officers and cyber cell experts. The CF was analyzed using secondary data. We predicted and prioritized CF based on machine learning-derived Random Forest (RF). An efficient fraud mitigation model was developed based on an offender-victim-centric approach. Mitigation is advised both before and after fraud occurs. Through the findings of this research, banks and fraud investigators can prevent CF by detecting it quickly and controlling it on time. This study proposes a structured, sustainable CF mitigation plan that protects banks, employees, regulators, customers, and the economy, thus saving time, resources, and money. Further, these mitigation measures will improve the reputation of the Indian banking industry and ensure its survival. [ABSTRACT FROM AUTHOR]
Copyright of Behaviour & Information Technology is the property of Taylor & Francis Ltd and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Business Source Complete
Full text is not displayed to guests.
FullText Links:
  – Type: pdflink
Text:
  Availability: 1
CustomLinks:
  – Url: https://resolver.ebsco.com/c/xy5jbn/result?sid=EBSCO:bth&genre=article&issn=0144929X&ISBN=&volume=43&issue=5&date=20240401&spage=876&pages=876-906&title=Behaviour & Information Technology&atitle=Insider%20employee-led%20cyber%20fraud%20%28IECF%29%20in%20Indian%20banks%3A%20from%20identification%20to%20sustainable%20mitigation%20planning.&aulast=Roy%2C%20Neha%20Chhabra&id=DOI:10.1080/0144929X.2023.2191748
    Name: Full Text Finder (for New FTF UI) (s8985755)
    Category: fullText
    Text: Find It @ SCU Libraries
    MouseOverText: Find It @ SCU Libraries
Header DbId: bth
DbLabel: Business Source Complete
An: 176146596
AccessLevel: 6
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 0
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning.
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Roy%2C+Neha+Chhabra%22">Roy, Neha Chhabra</searchLink><relatesTo>1</relatesTo> (AUTHOR)<i> Nehang201112@gmail.com</i><br /><searchLink fieldCode="AR" term="%22Prabhakaran%2C+Sreeleakha%22">Prabhakaran, Sreeleakha</searchLink><relatesTo>1</relatesTo> (AUTHOR)
– Name: TitleSource
  Label: Source
  Group: Src
  Data: <searchLink fieldCode="JN" term="%22Behaviour+%26+Information+Technology%22">Behaviour & Information Technology</searchLink>. Apr2024, Vol. 43 Issue 5, p876-906. 31p.
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: *<searchLink fieldCode="DE" term="%22Banking+laws%22">Banking laws</searchLink><br />*<searchLink fieldCode="DE" term="%22Corruption%22">Corruption</searchLink><br />*<searchLink fieldCode="DE" term="%22Organizational+behavior%22">Organizational behavior</searchLink><br />*<searchLink fieldCode="DE" term="%22Risk+assessment%22">Risk assessment</searchLink><br />*<searchLink fieldCode="DE" term="%22Data+security%22">Data security</searchLink><br />*<searchLink fieldCode="DE" term="%22Computers%22">Computers</searchLink><br />*<searchLink fieldCode="DE" term="%22Focus+groups%22">Focus groups</searchLink><br />*<searchLink fieldCode="DE" term="%22Data+security+failures%22">Data security failures</searchLink><br />*<searchLink fieldCode="DE" term="%22Interviewing%22">Interviewing</searchLink><br />*<searchLink fieldCode="DE" term="%22Debt%22">Debt</searchLink><br />*<searchLink fieldCode="DE" term="%22Questionnaires%22">Questionnaires</searchLink><br />*<searchLink fieldCode="DE" term="%22Artificial+intelligence%22">Artificial intelligence</searchLink><br />*<searchLink fieldCode="DE" term="%22Identity+theft%22">Identity theft</searchLink><br />*<searchLink fieldCode="DE" term="%22Security+systems%22">Security systems</searchLink><br />*<searchLink fieldCode="DE" term="%22Financial+stress%22">Financial stress</searchLink><br />*<searchLink fieldCode="DE" term="%22Job+stress%22">Job stress</searchLink><br />*<searchLink fieldCode="DE" term="%22Artificial+neural+networks%22">Artificial neural networks</searchLink><br />*<searchLink fieldCode="DE" term="%22Algorithms%22">Algorithms</searchLink><br /><searchLink fieldCode="DE" term="%22Fraud+prevention%22">Fraud prevention</searchLink><br /><searchLink fieldCode="DE" term="%22Random+forest+algorithms%22">Random forest algorithms</searchLink><br /><searchLink fieldCode="DE" term="%22Logistic+regression+analysis%22">Logistic regression analysis</searchLink><br /><searchLink fieldCode="DE" term="%22Research+methodology%22">Research methodology</searchLink><br /><searchLink fieldCode="DE" term="%22Conceptual+structures%22">Conceptual structures</searchLink><br /><searchLink fieldCode="DE" term="%22Machine+learning%22">Machine learning</searchLink>
– Name: SubjectGeographic
  Label: Geographic Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22India%22">India</searchLink>
– Name: Abstract
  Label: Abstract
  Group: Ab
  Data: This paper explores the different insider employee-led cyber frauds (IECF) based on the recent large-scale fraud events of prominent Indian banking institutions. Examining the different types of fraud and appropriate control measures will protect the banking industry from fraudsters. In this study, we identify and classify Cyber Fraud (CF), map the severity of the fraud on a scale of priority, test the mitigation effectiveness, and propose optimal mitigation measures. The identification and classification of CF losses were based on a literature review and focus group discussions with risk and vigilance officers and cyber cell experts. The CF was analyzed using secondary data. We predicted and prioritized CF based on machine learning-derived Random Forest (RF). An efficient fraud mitigation model was developed based on an offender-victim-centric approach. Mitigation is advised both before and after fraud occurs. Through the findings of this research, banks and fraud investigators can prevent CF by detecting it quickly and controlling it on time. This study proposes a structured, sustainable CF mitigation plan that protects banks, employees, regulators, customers, and the economy, thus saving time, resources, and money. Further, these mitigation measures will improve the reputation of the Indian banking industry and ensure its survival. [ABSTRACT FROM AUTHOR]
– Name: AbstractSuppliedCopyright
  Label:
  Group: Ab
  Data: <i>Copyright of Behaviour & Information Technology is the property of Taylor & Francis Ltd and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.)
PLink https://login.libproxy.scu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=bth&AN=176146596
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.1080/0144929X.2023.2191748
    Languages:
      – Code: eng
        Text: English
    PhysicalDescription:
      Pagination:
        PageCount: 31
        StartPage: 876
    Subjects:
      – SubjectFull: Banking laws
        Type: general
      – SubjectFull: Corruption
        Type: general
      – SubjectFull: Organizational behavior
        Type: general
      – SubjectFull: Risk assessment
        Type: general
      – SubjectFull: Data security
        Type: general
      – SubjectFull: Computers
        Type: general
      – SubjectFull: Focus groups
        Type: general
      – SubjectFull: Data security failures
        Type: general
      – SubjectFull: Interviewing
        Type: general
      – SubjectFull: Debt
        Type: general
      – SubjectFull: Questionnaires
        Type: general
      – SubjectFull: Artificial intelligence
        Type: general
      – SubjectFull: Identity theft
        Type: general
      – SubjectFull: Security systems
        Type: general
      – SubjectFull: Financial stress
        Type: general
      – SubjectFull: Job stress
        Type: general
      – SubjectFull: Artificial neural networks
        Type: general
      – SubjectFull: Algorithms
        Type: general
      – SubjectFull: Fraud prevention
        Type: general
      – SubjectFull: Random forest algorithms
        Type: general
      – SubjectFull: Logistic regression analysis
        Type: general
      – SubjectFull: Research methodology
        Type: general
      – SubjectFull: Conceptual structures
        Type: general
      – SubjectFull: Machine learning
        Type: general
      – SubjectFull: India
        Type: general
    Titles:
      – TitleFull: Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning.
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Roy, Neha Chhabra
      – PersonEntity:
          Name:
            NameFull: Prabhakaran, Sreeleakha
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 04
              Text: Apr2024
              Type: published
              Y: 2024
          Identifiers:
            – Type: issn-print
              Value: 0144929X
          Numbering:
            – Type: volume
              Value: 43
            – Type: issue
              Value: 5
          Titles:
            – TitleFull: Behaviour & Information Technology
              Type: main
ResultId 1