Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning.
Title: | Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning. |
---|---|
Authors: | Roy, Neha Chhabra1 (AUTHOR) Nehang201112@gmail.com, Prabhakaran, Sreeleakha1 (AUTHOR) |
Source: | Behaviour & Information Technology. Apr2024, Vol. 43 Issue 5, p876-906. 31p. |
Subject Terms: | *Banking laws, *Corruption, *Organizational behavior, *Risk assessment, *Data security, *Computers, *Focus groups, *Data security failures, *Interviewing, *Debt, *Questionnaires, *Artificial intelligence, *Identity theft, *Security systems, *Financial stress, *Job stress, *Artificial neural networks, *Algorithms, Fraud prevention, Random forest algorithms, Logistic regression analysis, Research methodology, Conceptual structures, Machine learning |
Geographic Terms: | India |
Abstract: | This paper explores the different insider employee-led cyber frauds (IECF) based on the recent large-scale fraud events of prominent Indian banking institutions. Examining the different types of fraud and appropriate control measures will protect the banking industry from fraudsters. In this study, we identify and classify Cyber Fraud (CF), map the severity of the fraud on a scale of priority, test the mitigation effectiveness, and propose optimal mitigation measures. The identification and classification of CF losses were based on a literature review and focus group discussions with risk and vigilance officers and cyber cell experts. The CF was analyzed using secondary data. We predicted and prioritized CF based on machine learning-derived Random Forest (RF). An efficient fraud mitigation model was developed based on an offender-victim-centric approach. Mitigation is advised both before and after fraud occurs. Through the findings of this research, banks and fraud investigators can prevent CF by detecting it quickly and controlling it on time. This study proposes a structured, sustainable CF mitigation plan that protects banks, employees, regulators, customers, and the economy, thus saving time, resources, and money. Further, these mitigation measures will improve the reputation of the Indian banking industry and ensure its survival. [ABSTRACT FROM AUTHOR] |
Copyright of Behaviour & Information Technology is the property of Taylor & Francis Ltd and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
Database: | Business Source Complete |
Full text is not displayed to guests. | Login for full access. |
FullText | Links: – Type: pdflink Text: Availability: 1 CustomLinks: – Url: https://resolver.ebsco.com/c/xy5jbn/result?sid=EBSCO:bth&genre=article&issn=0144929X&ISBN=&volume=43&issue=5&date=20240401&spage=876&pages=876-906&title=Behaviour & Information Technology&atitle=Insider%20employee-led%20cyber%20fraud%20%28IECF%29%20in%20Indian%20banks%3A%20from%20identification%20to%20sustainable%20mitigation%20planning.&aulast=Roy%2C%20Neha%20Chhabra&id=DOI:10.1080/0144929X.2023.2191748 Name: Full Text Finder (for New FTF UI) (s8985755) Category: fullText Text: Find It @ SCU Libraries MouseOverText: Find It @ SCU Libraries |
---|---|
Header | DbId: bth DbLabel: Business Source Complete An: 176146596 AccessLevel: 6 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 0 |
IllustrationInfo | |
Items | – Name: Title Label: Title Group: Ti Data: Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Roy%2C+Neha+Chhabra%22">Roy, Neha Chhabra</searchLink><relatesTo>1</relatesTo> (AUTHOR)<i> Nehang201112@gmail.com</i><br /><searchLink fieldCode="AR" term="%22Prabhakaran%2C+Sreeleakha%22">Prabhakaran, Sreeleakha</searchLink><relatesTo>1</relatesTo> (AUTHOR) – Name: TitleSource Label: Source Group: Src Data: <searchLink fieldCode="JN" term="%22Behaviour+%26+Information+Technology%22">Behaviour & Information Technology</searchLink>. Apr2024, Vol. 43 Issue 5, p876-906. 31p. – Name: Subject Label: Subject Terms Group: Su Data: *<searchLink fieldCode="DE" term="%22Banking+laws%22">Banking laws</searchLink><br />*<searchLink fieldCode="DE" term="%22Corruption%22">Corruption</searchLink><br />*<searchLink fieldCode="DE" term="%22Organizational+behavior%22">Organizational behavior</searchLink><br />*<searchLink fieldCode="DE" term="%22Risk+assessment%22">Risk assessment</searchLink><br />*<searchLink fieldCode="DE" term="%22Data+security%22">Data security</searchLink><br />*<searchLink fieldCode="DE" term="%22Computers%22">Computers</searchLink><br />*<searchLink fieldCode="DE" term="%22Focus+groups%22">Focus groups</searchLink><br />*<searchLink fieldCode="DE" term="%22Data+security+failures%22">Data security failures</searchLink><br />*<searchLink fieldCode="DE" term="%22Interviewing%22">Interviewing</searchLink><br />*<searchLink fieldCode="DE" term="%22Debt%22">Debt</searchLink><br />*<searchLink fieldCode="DE" term="%22Questionnaires%22">Questionnaires</searchLink><br />*<searchLink fieldCode="DE" term="%22Artificial+intelligence%22">Artificial intelligence</searchLink><br />*<searchLink fieldCode="DE" term="%22Identity+theft%22">Identity theft</searchLink><br />*<searchLink fieldCode="DE" term="%22Security+systems%22">Security systems</searchLink><br />*<searchLink fieldCode="DE" term="%22Financial+stress%22">Financial stress</searchLink><br />*<searchLink fieldCode="DE" term="%22Job+stress%22">Job stress</searchLink><br />*<searchLink fieldCode="DE" term="%22Artificial+neural+networks%22">Artificial neural networks</searchLink><br />*<searchLink fieldCode="DE" term="%22Algorithms%22">Algorithms</searchLink><br /><searchLink fieldCode="DE" term="%22Fraud+prevention%22">Fraud prevention</searchLink><br /><searchLink fieldCode="DE" term="%22Random+forest+algorithms%22">Random forest algorithms</searchLink><br /><searchLink fieldCode="DE" term="%22Logistic+regression+analysis%22">Logistic regression analysis</searchLink><br /><searchLink fieldCode="DE" term="%22Research+methodology%22">Research methodology</searchLink><br /><searchLink fieldCode="DE" term="%22Conceptual+structures%22">Conceptual structures</searchLink><br /><searchLink fieldCode="DE" term="%22Machine+learning%22">Machine learning</searchLink> – Name: SubjectGeographic Label: Geographic Terms Group: Su Data: <searchLink fieldCode="DE" term="%22India%22">India</searchLink> – Name: Abstract Label: Abstract Group: Ab Data: This paper explores the different insider employee-led cyber frauds (IECF) based on the recent large-scale fraud events of prominent Indian banking institutions. Examining the different types of fraud and appropriate control measures will protect the banking industry from fraudsters. In this study, we identify and classify Cyber Fraud (CF), map the severity of the fraud on a scale of priority, test the mitigation effectiveness, and propose optimal mitigation measures. The identification and classification of CF losses were based on a literature review and focus group discussions with risk and vigilance officers and cyber cell experts. The CF was analyzed using secondary data. We predicted and prioritized CF based on machine learning-derived Random Forest (RF). An efficient fraud mitigation model was developed based on an offender-victim-centric approach. Mitigation is advised both before and after fraud occurs. Through the findings of this research, banks and fraud investigators can prevent CF by detecting it quickly and controlling it on time. This study proposes a structured, sustainable CF mitigation plan that protects banks, employees, regulators, customers, and the economy, thus saving time, resources, and money. Further, these mitigation measures will improve the reputation of the Indian banking industry and ensure its survival. [ABSTRACT FROM AUTHOR] – Name: AbstractSuppliedCopyright Label: Group: Ab Data: <i>Copyright of Behaviour & Information Technology is the property of Taylor & Francis Ltd and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
PLink | https://login.libproxy.scu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=bth&AN=176146596 |
RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1080/0144929X.2023.2191748 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 31 StartPage: 876 Subjects: – SubjectFull: Banking laws Type: general – SubjectFull: Corruption Type: general – SubjectFull: Organizational behavior Type: general – SubjectFull: Risk assessment Type: general – SubjectFull: Data security Type: general – SubjectFull: Computers Type: general – SubjectFull: Focus groups Type: general – SubjectFull: Data security failures Type: general – SubjectFull: Interviewing Type: general – SubjectFull: Debt Type: general – SubjectFull: Questionnaires Type: general – SubjectFull: Artificial intelligence Type: general – SubjectFull: Identity theft Type: general – SubjectFull: Security systems Type: general – SubjectFull: Financial stress Type: general – SubjectFull: Job stress Type: general – SubjectFull: Artificial neural networks Type: general – SubjectFull: Algorithms Type: general – SubjectFull: Fraud prevention Type: general – SubjectFull: Random forest algorithms Type: general – SubjectFull: Logistic regression analysis Type: general – SubjectFull: Research methodology Type: general – SubjectFull: Conceptual structures Type: general – SubjectFull: Machine learning Type: general – SubjectFull: India Type: general Titles: – TitleFull: Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Roy, Neha Chhabra – PersonEntity: Name: NameFull: Prabhakaran, Sreeleakha IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 04 Text: Apr2024 Type: published Y: 2024 Identifiers: – Type: issn-print Value: 0144929X Numbering: – Type: volume Value: 43 – Type: issue Value: 5 Titles: – TitleFull: Behaviour & Information Technology Type: main |
ResultId | 1 |