Importance of implementing cybersecurity in financial risk management: key to ensuring customer
DOI:
https://doi.org/10.54943/ricci.v4i2.516Keywords:
Cybersecurity, banking system, risk management, banksAbstract
In today's landscape, financial institutions face not only physical security risks such as robberies and assaults but also cyber threats due to the continuous advancement of IT implementations. These technologies enhance efficiency in transactions, enabling institutions to excel in the financial sector but potentially introducing operational risks that affect client trust. This article explores the impact of cybersecurity on risk management within financial institutions through a systematic review of literature spanning 2019 to 2024.
Through dedicated study of current literature, we gain insights into cybersecurity practices and their effectiveness in safeguarding financial integrity
Downloads
References
Delgado Fernández, T. (2020). Taxonomía de transformación digital (Vol. 1). https://orcid.org/0000-0002-4323-9674
Lucio-Nieto, T., Palacios, R. C., & Mora-Soto, A. (2012). Hacia una Oficina de Gestión de Servicios en el ámbito de ITIL.Cisco. (2021). What Is Cybersecurity? Recuperado de https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
COSO. (2017). Enterprise Risk Management -Integrating with Strategy and Performance. Recuperado de https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdfDeloitte. (2020). Future of Cybersecurity in Financial Services. Recuperado de https://www2.deloitte.com/global/en/pages/financial-services/articles/future-of-cybersecurity-in-financial-services.html.
KPMG. (2021). Cyber Security: Financial Services. Recuperado de https://home.kpmg/xx/en/home/industries/financial-services/cyber-security.html
Lucio-Nieto, C., et al. (2012). ITIL: Servicio de TI. Revista de Investigación en Tecnologías de la Información, 19(2), 45-58.
McAfee. (2019). Understanding Social Engineering Attacks. Recuperado de https://www.mcafee.com/blogs/other-blogs/mcafee-labs/understanding-social-engineering-attacks/
PwC. (2020). Global Risk Management Survey. Recuperado de https://www.pwc.com/gx/en/services/advisory/consulting/risk/global-risk-survey.html
Symantec. (2021). What is Malware? Recuperado de https://www.symantec.com/blogs/feature-stories/what-is-malware
Verizon. (2020). Data Breach Investigations Report. Recuperado de https://enterprise.verizon.com/resources/reports/dbir/
BCG. (2019). The Digital Transformation of Banking. Recuperado de https://www.bcg.com/publications/2019/digital-transformation-banking
Tejada-Escobar, F., Murrieta-Marcillo, R., Villao-Santos, F., & Garzón-Balcázar, J. (2018). Big Data en la Educación: Beneficios e Impacto de la Analítica de Datos. Revista Científica y Tecnológica UPSE, 5(2), 80–88. https://doi.org/10.26423/rctu.v5i2.424
Sheila, M., Leguizamón, M., & Villanueva, M. M. (2015). EL PHISHING TRABAJO FINAL DE GRADO. GRADO EN CRIMINOLOGÍA Y SEGURIDAD.
Monje, G., & Alexander, R. (2017). SEGURIDAD INFORMÁTICA Y EL MALWARE.
Armando, L., Páez, G., Emiro, J., Arenas, T., Natalia, A., & Moreno, B. (2019). CIBERSEGURIDAD Y ETHICAL HACKING: LA IMPORTANCIA DE PROTEGER LOS DATOS DEL USUARIO.
Kitchenham B., & Charters S. (2007). Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE 2007-001, Keele University and Durham University Joint Report.
Moher, D., Liberati, A., Tetzlaff, J., Altman, D. G., Altman, D., Antes, G., Atkins, D., Barbour, V., Barrowman, N., Berlin, J. A., Clark, J., Clarke, M., Cook, D., D'Amico, R., Deeks, J. J., Devereaux, P. J., Dickersin, K., Egger, M., Ernst, E., ... Tugwell, P. (2009). Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement (Chinese edition). Journal of integrative medicine, 7(9), 889-896. https://doi.org/10.3736/jcim20090918
Carlos Vilchez, J., Asesor, V., Cecilia, K., & Burgos, R. (2022). UNIVERSIDAD CATÓLICA SANTO TORIBIO DE MOGROVEJO FACULTAD DE INGENIERÍA ESCUELA DE INGENIERÍA DE SISTEMAS Y COMPUTACIÓN Ciberseguridad y robo de información: Una revisión sistemática de la literatura. https://orcid.org/0000-0003-3520-5076
Fu, Z., Dong, P., Li, S., & Ju, Y. (2021). An intelligent cross-border transaction system based on consortium blockchain: A case study in shenzhen, China. PLoS ONE, 16(6 June). https://doi.org/10.1371/journal.pone.0252489
Johri, A., & Kumar, S. (2023). Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation. Human Behavior and Emerging Technologies, 2023, 1–10. https://doi.org/10.1155/2023/2103442
Martinez Mesa, O. R., & Martines de la Peña, M. (2022). REGULACIÓN DE LA INNOVACIÓN FINANCIERA TECNOLÓGICA FINTECH EN LA INDUSTRIA BANCARIA COLOMBIANA: DESAFÍOS Y OPORTUNIDADES. AGLALA, 13, 215–237.
Lavanya, B., & Dunstan Rajkumar, A. (2024). Bibliometric insights on mapping the landscape of cybersecurity: Uncovering the research potential in banking industry. En Multidisciplinary Reviews (Vol. 7, Número 6). Malque Publishing. https://doi.org/10.31893/multirev.2024113.
Saxena, R., Gayathri, E., & Surya Kumari, L. (2023). Semantic analysis of blockchain intelligence with proposed agenda for future issues. Int J Syst Assur Eng Manag, 14, 34–54.
Tamanna, C., Asmita, C., Shriya, P., Poojan, P., Daxal, P., & Manan, S. (2024). A Comprehensive Study of Artificial Intelligence and Cybersecurity on Bitcoin, Crypto Currency and Banking System. Annals of Data Science, 11(1), 103–135.
Uddin, M. H., Mollah, S., & Ali, M. H. (2020). Does cyber tech spending matter for bank stability? International Review of Financial Analysis, 72. https://doi.org/10.1016/j.irfa.2020.101587
Uddin, M. H., Mollah, S., Islam, N., & Ali, M. H. (2023). Does digital transformation matter for operational risk exposure? Technological Forecasting and Social Change, 197. https://doi.org/10.1016/j.techfore.2023.122919.
Published
How to Cite
-
Abstract1825
-
PDF (Español (España))1531
-
HTML (Español (España))50
Issue
Section
License
Copyright (c) 2024 Dominick Revilla, Diego Rodriguez, Alberto Mendoza

This work is licensed under a Creative Commons Attribution 4.0 International License.









DOI:10.54943/ricci.







