AN ASSESSMENT OF CYBER CRIME IN COMMERCIAL BANKS IN CALABAR METROPOLIS

Main Article Content

Martins Myke-Okoi Okpa

Abstract

The incidence of cyber fraud and crimes has increased exponentially in the financial industry, with excruciating consequences on commercial banks as a result of technological advancements, adopted to meet customers’ needs and gain competitive advantage. Due to the ever-increasing causes, this study examines the effects or impact of cybercrime on financial institutions performance. Specifically, the study investigates the prevalence of cybercrimes recorded by commercial banks and the effect on the performance of the banks. This paper is anchored on the differential opportunity theory. The survey research design was adopted, and questionnaires administered on 323 staff of sixteen (16) commercial banks located in Calabar Metropolis. Three hundred respondents completed and returned their questionnaires. The data collected were analysed using SPSS 26, with descriptive and correlation analyses performed on the data. The hypotheses were tested using Ordinary Least Square (OLS) regression technique. From the analyses, it was found that the four major cybercrimes recorded by commercial banks in Calabar were Phishing, Skimming, Malware and Distributed Denial of Service crimes. The test of hypotheses revealed that these four cybercrimes significantly jeopardize the performance of Commercial banks. The study concludes that cybercrimes expose commercial banks to liquidity shocks, increased credit risk, loss of business information, loss of reputation, financial losses and loss of operational efficiency. This study contributes to gaining more insight into the impact of cybercrime in the banking sector, and recommends that cyber risk management techniques be effectively implemented by banks, if they must continue in operation and earn returns on their investments.

Downloads

Download data is not yet available.

Article Details

How to Cite
Okpa, M. M.-O. (2024). AN ASSESSMENT OF CYBER CRIME IN COMMERCIAL BANKS IN CALABAR METROPOLIS. Ibom Journal of Social Issues, 11(4), 20–25. https://doi.org/10.60787/ijsi.v11i4.44
Section
Articles

References

Ahmad, N., and Schreyer, P. (2016). Measuring GDP in a Digitalised Economy. Paris: OECD Publishing. doi:doi.org/10.1787/18152031

Aldasoro, I., Gambacorta, L., Giudici, P., and Leach, T. (2020a). Operational and cyber risks in the financial sector. BIS Working Paper No. 840. Basel, Switzerland: Bank for International Settlements.

Arachchilage, N. A. G., and Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behaviour, 38: 304 – 312.

Bhasin, M. (2007). Mitigating cyber threats to banking industry. The Chartered Accountant, 55(10), 1618 – 1624.

Boer, M., and Vazquez, J. (2017). Cyber Security and Financial Stability: How cyber-attacks could materially impact the global financial system. Washington: The Institute of International Finance.

Böhme, R. and Moore, T. (2012). How do consumers react to cybercrime? E-crime Researchers’ Summit (E-crime), IEEE, 1–12.

Brown, C. S. (2015). Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice. International Journal of Cyber Criminology, 9(01), 55 – 119. doi: 10.5281/zenodo.22387

Caron, F. (2015). Cyber risk management in financial market infrastructures: elements for a holistic and risk-based approach to cyber security. Belgium: National Bank of Belgium. Retrieved from https://lirias.kuleuven.be/1834699?limo=0

Choo, K.-K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers and Security, 33(8), 719 – 731.

Cloward, R. A. and Ohlin, L. E. (1960). Delinquency and Opportunity: A theory of delinquent gangs. New York. The Free Press. In Schmalleger, F. (2006) Criminology Today: An Integrative Introduction (4th ed.). New Jersey: Pearson Prentice Hall. Pp. 323

Das, S., Mukhopadhyay, A., and Anand, M. (2012). Stock Market Response to Information Security Breach: A Study Using Firm and Attack Characteristics. Journal of Information Privacy and Security, 8(4), 27 – 55.

Donge, Z., Luo, F., and Liang, G. (2018). Blockchain: a secure, decentralized, trusted cyber infrastructure solution for future energy systems. Journal of Modern Power Systems and Clean Energy, 1: 1 – 10.

Duran, R. E., and Griffin, P. (2019). Smart contracts: will Fintech be the catalyst for the next global financial crisis? Journal of Financial Regulation and Compliance, In Press.

Eling, M., and Lehmann, M. (2018). The Impact of Digitalization on the Insurance Value Chain and the Insurability of Risks. The Geneva Papers on Risk and Insurance-Issues and Practice, 43(3), 359 – 396.

Eling, M., andWirfs, J. (2019). What are the actual costs of cyber risk events? European Journal of Operational Research, 272(3), 1109 – 1119.

Geyres, S., and Orozco, M. (2016). Think banking cyber-security is just a technology issue? Think again. accenture strategy. Retrieved from https://www.accenture.com/t 20160419t004021_w_/us- en/_acnmedia/pdf-13/accenture-strategy-cybersecurity-in-banking.pdf

Gommans, L., Vollbrecht, J., Bruijn, B. G. D., and Laat, C. D. (2015). The Service Provider Group framework. A framework for arranging trust and power to facilitate authorization of network services. Future Generation Computer Systems, 45, 176 – 192.

Gopalakrishnan, R., and Mogato, M. (2016, May 19). Bangladesh Bank official’s computer was hacked to carry out $81 million heist: Diplomat. Reuters: Business News. Thomson Reuters.

Gracie, A. (2015). Cyber resilience: a financial stability perspective: Cyber Defence and Network Security conference. London. Retrieved from https://www.bankofengland.co.uk/speech/2015/cyber- resilience-a-financial-stability-perspective

Granåsen, M., and Andersson, D. (2016). Measuring team effectiveness in cyber-defense exercises: a cross- disciplinary case study. Cognition, Technology and Work, 18(1), 121–143.

Hastings, B. (2015). Cyber-security: A growing concern for banking. Journal of Investment Compliance, 16(3), 5 – 7. https://doi.org/10.1108/JIC-01-2015-0005

Herath, T. and Rao, R. (2009) Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organizations. European Journal of Information Systems, 18, 106 – 125.

Hon, W. K., and Millard, C. (2018). Banking in the cloud: Banks’ use of cloud services. Computer Law and Security Review, 34, 4 – 24.

Horne, R. (2014). The cyber threat to banking. PWC. Retrieved from https://www.bba.org.uk/wp-content/uploads/2014/06/BBAJ2110_Cyber_-report_May_2014_WEB.pdf

Hovav, A., and D’Arcy, J. (2004). The Impact of Virus Attack Announcements on the Market Value of Firms. Information Systems Security, 13(3), 32 – 40.

Johnson, K. N. (2015). Managing Cyber Risk. Georgia Law Review, 50(2), 548 – 592.

Juma’h, A. H., andAlnsour, Y. (2020). The effect of data breaches on company performance. International Journal of Accounting and Information

Management, 28(2), 275 – 301.

Kamiya, S., KangJun-Koo, Jungmin, K., Milidonis, A., andStulz, R. M. (2020). Risk management, firm reputation, and the impact of successful cyber-attacks on target firms. Journal of Financial Economics, In Press.

Kopp, E., Kaffenberger, L., and Wilson, C. (2017). Cyber Risk, Market Failures, and Financial Stability, Working Paper. International Monetary Fund (WP/17/185).

Kraemer-Mbula, E., Tang, P., and Rush, H. (2013). The cybercrime ecosystem: Online innovation in the shadows? Technological Forecasting and Social Change, 80(3), 541 – 555.

Lagazio, M., Sherif, N., and Cushman, a. M. (2014). A multi-level approach to understanding the impact of cybercrime on the financial sector. Computers and Security, 45, 58-74.

Langton, J. (2018, June 4). Data breaches credit negative for BMO and CIBC: Moody’s. Retrieved from https://www.investmentexecutive.com/news/industry-news/data- breaches-credit-negative-for-bmo-and-cibc-moodys/

Lewis, J., and Baker, S. (2013). The Economic Impact of Cybercrime and Cyber Espionage. McAfee.

Longstaff, T., Chittister, C., Pethia, R., andHaimes, Y. (2020). Are we forgetting the risks of information technology? Computer, 33(12), 43 – 51.

Leukfeldt, R., Veenstra, S. andStol, W. (2013). High volume cyber crime and the organization of the police: The results of two empirical studies in

the Netherlands. Journal of Cyber Criminology, 7(1).

Low, P. (2017). Insuring against cyber-attacks. Computer Fraud and Security, 4, 18-20.

Macaulay, T. (2018). Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies (1st ed.). Boca Raton: Taylor and Francis Group.

Manzoor, A. (2014). A Look at Efficiency in Public Administration: Past and Future. SAGE Open, 4, 1-5. https://doi.org/10.1177/2158244014564936

Mayahi, A., and Humaid, I. (2016). Development of a Comprehensive Information Security System for UAE e-Government. PhD thesis, Prifysgol Bangor University.

McConnell, Patrick, Blacker, and Keith. (2013). Systemic operational risk: does it exist and, if so, how do we regulate it? The Journal of Operational Risk, 8(1), 59 – 99.

Morton, M., Werner, J., Kintis, P., Snow, K., Antonakakis, M., Polychronakis, M., andMonrose, F. (2018). Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks. IEEE European Symposium on Security and Privacy, (pp. 167- 182).

Nwogwugwu, N., and Uzoechina, P. (2015).Cybercrime and Nigeria's economic development. Journal of Humanities and Social Science, 20(5), 1 – 10.

Shackelford, S. J. (2012). Should your firm invest in cyber risk insurance? Business Horizons, 55, 349 – 356.

Sharma, A., and Tandekar, P. (2018). Cyber Security and Business Growth. IGI Global, 1208 – 1221.

Soomro, Z. A., Shah, M. H., and Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215 – 225.

Stokkel, M. and Smulders, A. (2013). Cyber-security: Hoe word het behapbaar? Keynotes, 42 – 26.

Teece, D. J. (2018). Profiting from innovation in the digital economy: Enabling technologies, standards, and licensing models in the wireless world. Research Policy, 47(8), 1367 – 1387.

Tendulkar, R. (2013). Cyber-crime, securities markets and systemic risk. CFA Digest, 43(4), 35 – 43.

Verma, M., Hussain, S.A. and Kuswah, S.S. (2012). Cyber Law: Approach to Prevent Cyber Crime. IJRREST: International Journal of Research Review in Engineering Science and Technology, 1(3), 123 – 129.