Digital Transformation in Banking: Shielding Against Cyber Threats and Operational Risks

Main Article Content

Maria Wati

Abstract

This paper examines the digital transformation currently reshaping the banking sector, focusing on the critical nexus of cybersecurity and operational risk management. The objective is to explore the multifaceted challenges and opportunities presented by this transformation, emphasizing the need for robust strategies to mitigate cyber threats and ensure operational resilience. The methodology involves a comprehensive literature review, synthesizing insights from academic journals, industry reports, and case studies. Key findings reveal that while digital transformation offers significant benefits such as enhanced efficiency and customer experience, it simultaneously expands the attack surface for cyber threats. The study highlights the increasing sophistication of cyberattacks and the growing reliance on digital infrastructure, emphasizing the importance of proactive security measures, including artificial intelligence (AI)-based solutions and blockchain technology. The paper concludes with recommendations for financial institutions to adopt a holistic approach to cybersecurity, integrating robust risk management frameworks, fostering collaboration, and investing in advanced technologies to safeguard against potential threats and ensure operational continuity.

Article Details

How to Cite
Wati, M. (2024). Digital Transformation in Banking: Shielding Against Cyber Threats and Operational Risks. Samarinda International Journal of Islamic Studies, 1(3), 1–9. https://doi.org/10.64093/sijis.v1i3.584
Section
Articles

References

Ali, O., Ally, M., Clutterbuck, D., & Dwivedi, Y. K. (2020). The state of play of blockchain technology in the financial services sector: A systematic literature review. International Journal of Information Management, 53, 102199. https://doi.org/10.1016/j.ijinfomgt.2020.102199

Allioui, H., & Mourdi, Y. (2023). Exploring the Full Potentials of IoT for Better Financial Growth and Stability: A Comprehensive Survey. Sensors, 23(19), 8015. https://doi.org/10.3390/s23198015

Anagnostopoulos, I. (2018). Fintech and regtech: Impact on regulators and banks. Journal of Economics and Business, 98, 1-13. https://doi.org/10.1016/j.jeconbus.2018.07.003

Burton, J. W. (2015). NATO’s cyber defence: strategic challenges and institutional adaptation. Defence Studies, 15(3), 213-233. https://doi.org/10.1080/14702436.2015.1108108

Chander, A., Abraham, M., Chandy, S. T., Fang, Y., Park, D., & Yu, I. (2021). Achieving Privacy: Costs of Compliance and Enforcement of Data Protection Regulation. World Bank. https://doi.org/10.1596/1813-9450-9594

Gill, S. S., Xu, M., Ottaviani, C., Patros, P., Bahsoon, R., Shaghaghi, A., Golec, M., Stankovski, V., Wu, H., Abraham, A., Singh, M., Mehta, H., Ghosh, S. K., Baker, T., Parlikad, A. K., Lutfiyya, H., Kanhere, S. K., Sakellariou, R., Dustdar, S., Rana, O., Brandić, I., & Uhlig, S. (2022). AI for next generation computing: Emerging trends and future directions. Internet of Things, 19, 100514. https://doi.org/10.1016/j.iot.2022.100514

Hu, W., Chang, C.-H., Sengupta, A., Bhunia, S., Kastner, R., & Li, H. (2020). An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(12), 4447-4466. https://doi.org/10.1109/tcad.2020.3047976

Huang, L., & Pontell, H. N. (2022). Crime and crisis in China’s P2P online lending market: a comparative analysis of fraud. Crime Law and Social Change, 78(5), 593-614. https://doi.org/10.1007/s10611-022-10053-y

Iftikhar, A., Ali, I., Arslan, A., & Tarba, S. Y. (2022). Digital Innovation, Data Analytics, and Supply Chain Resiliency: A Bibliometric-based Systematic Literature Review. Annals of Operations Research, 333(1), 1-41. https://doi.org/10.1007/s10479-022-04765-6

Jameel, A., Asif, M., & Hussain, A. (2019). Good Governance and Public Trust: Assessing the Mediating Effect of E-Government in Pakistan. Lex localis - Journal of Local Self-Government, 17(2), 299-320. https://doi.org/10.4335/17.2.299-320(2019)

Karahoca, A. (2012). Data Mining Applications in Engineering and Medicine. InTech. https://doi.org/10.5772/2616

Khan, R., Kumar, P., Jayakody, D. N. K., & Liyanage, M. (2019). A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions. IEEE Communications Surveys & Tutorials, 21(3), 2739-2771. https://doi.org/10.1109/comst.2019.2933899

Khan, S., Sharma, I., Aslam, M. K., Khan, M. Z., & Khan, S. (2021). Security Challenges of Location Privacy in VANETs and State-of-the-Art Solutions: A Survey. Future Internet, 13(4), 96. https://doi.org/10.3390/fi13040096

Koblentz, G. D., & Mazanec, B. M. (2013). Viral Warfare: The Security Implications of Cyber and Biological Weapons. Comparative Strategy, 32(4), 316-329. https://doi.org/10.1080/01495933.2013.821845

Kuipers, S., & Schonheit, M. (2021). Data Breaches and Effective Crisis Communication: A Comparative Analysis of Corporate Reputational Crises. Corporate Reputation Review, 24(1), 1-20. https://doi.org/10.1057/s41299-021-00121-9

Lazarus, S. (2024). Cybercriminal Networks and Operational Dynamics of Business Email Compromise (BEC) Scammers: Insights from the “Black Axe” Confraternity. Deviant Behavior, 45(10), 1-18. https://doi.org/10.1080/01639625.2024.2352049

Lee, S., & Kim, S. (2021). Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges. IEEE Access, 9, 170751-170761. https://doi.org/10.1109/access.2021.3136328

Liagkou, V., Stylios, C., Pappa, L., & Petunin, A. (2021). Challenges and Opportunities in Industry 4.0 for Mechatronics, Artificial Intelligence and Cybernetics. Electronics, 10(16), 2001. https://doi.org/10.3390/electronics10162001

Makulilo, A. B. (2016). African Data Privacy Laws. Springer International Publishing. https://doi.org/10.1007/978-3-319-47317-8

Mentges, A., Halekotte, L., Schneider, M., Demmer, T., & Lichte, D. (2023). A resilience glossary shaped by context: Reviewing resilience-related terms for critical infrastructures. International Journal of Disaster Risk Reduction, 94, 103893. https://doi.org/10.1016/j.ijdrr.2023.103893

Merlonghi, G. (2010). Fighting financial crime in the age of electronic money: opportunities and limitations. Journal of Money Laundering Control, 13(2), 165-176. https://doi.org/10.1108/13685201011057118

Mishra, S. (2023). Exploring the Impact of AI-Based Cyber Security Financial Sector Management. Applied Sciences, 13(10), 5875. https://doi.org/10.3390/app13105875

Mızrak, F. (2023). Integrating cybersecurity risk management into strategic management: a comprehensive literature review. Pressacademia, 15(1), 137-149. https://doi.org/10.17261/pressacademia.2023.1807

OECD. (2011). Future Global Shocks. OECD Publishing. https://doi.org/10.1787/9789264114586-en

OECD. (2022). Southeast Asia Energy Outlook 2022. OECD Publishing. https://doi.org/10.1787/10bc5730-en

Oura, H., Sedik, T. S., Yepes, C. V., Leckow, R., Almeida, Y., Kyriakos-Saad, N., Kashima, M., Stetsenko, N., Habermeier, K., Haksar, V., & He, D. (2016). Virtual Currencies and Beyond. International Monetary Fund. https://doi.org/10.5089/9781498363273.006

Ranaweera, P., Jurcut, A. D., & Liyanage, M. (2021). MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures. ACM Computing Surveys, 54(1), 1-39. https://doi.org/10.1145/3474552

Rane, N. L. (2023). Multidisciplinary collaboration: key players in successful implementation of ChatGPT and similar generative artificial intelligence in manufacturing, finance, retail, transportation, and construction industry. https://doi.org/10.31219/osf.io/npm3d

Rath, A. T., Spasić, B., Boucart, N., & Thiran, P. (2019). Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure. Computers, 8(2), 34. https://doi.org/10.3390/computers8020034

Rodríguez-Espíndola, O., Chowdhury, S., Dey, P. K., Albores, P., & Emrouznejad, A. (2022). Analysis of the adoption of emergent technologies for risk management in the era of digital manufacturing. Technological Forecasting and Social Change, 185, 121562. https://doi.org/10.1016/j.techfore.2022.121562