Countering Cybercrime Risks in Financial Institutions: Forecasting Information Trends
Abstract
:1. Introduction
2. Literature Review
3. Data and Research Methodology
3.1. Data
3.2. Research Methodology
- (1)
- An additive cyclical model (10):
- (2)
- A trend-cyclic additive model with a linear trend (11):
- (3)
- A trend-cyclic additive model with an exponential trend (12):
- (4)
- A trend-cyclic additive model with a damped trend (13):
- (5)
- A multiplicative cyclical model (14):
- (6)
- A multiplicative trend-cyclic model with a linear trend (15):
- (7)
- A multiplicative trend-cyclic model with an exponential trend (16):
- (8)
- A multiplicative trend-cyclic model with a damped trend (17):
4. Results
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Case | CS | NI | CI | Case | CS | NI | CI |
---|---|---|---|---|---|---|---|
1 | −1.63689 | −6.11530 | −4.06617 | 25 | −1.84210 | 1.41283 | 4.52446 |
2 | −6.18898 | −4.03717 | −3.40992 | 26 | 0.44540 | 3.27533 | 2.42862 |
3 | −0.69939 | −2.39134 | −3.92033 | 27 | 1.36207 | 9.50033 | 9.33279 |
4 | −0.00148 | −3.16738 | −3.75367 | 28 | 0.86623 | 8.00866 | 13.63696 |
5 | 1.21207 | 5.62428 | 1.33487 | 29 | −0.99210 | 0.76699 | 11.32029 |
6 | 0.92561 | 4.35866 | −1.19117 | 30 | 3.42457 | 2.01283 | −0.19221 |
7 | 0.85269 | 2.42637 | −0.24846 | 31 | 2.66623 | 2.08783 | 2.77029 |
8 | −1.15773 | 4.69720 | −0.05054 | 32 | 5.04123 | −0.52884 | −0.73804 |
9 | −5.46502 | −2.29238 | −3.58700 | 33 | 2.61623 | 1.20449 | 0.16196 |
10 | −3.00668 | −3.75592 | 1.90779 | 34 | 3.56623 | 0.55449 | −2.74221 |
11 | −2.29835 | −0.02676 | −0.69638 | 35 | 5.89540 | 6.08366 | −1.06304 |
12 | −2.07439 | −1.82363 | 0.97550 | 36 | 3.00790 | 0.03783 | −0.61721 |
13 | −0.42856 | −6.36530 | 2.64217 | 37 | 1.10373 | −6.08717 | −2.17554 |
14 | −1.09523 | −2.40697 | 0.99633 | 38 | 3.82457 | 3.71699 | −0.27971 |
15 | −3.49627 | 3.50449 | 3.92342 | 39 | 10.70373 | 4.72116 | −1.03388 |
16 | −4.42335 | −1.83405 | 4.02237 | 40 | 9.60373 | 0.85449 | −1.97138 |
17 | −2.62648 | −3.15176 | 1.88175 | 41 | 2.10790 | −6.19551 | −5.48804 |
18 | −0.80877 | 1.03574 | 1.06404 | 42 | 3.20790 | −0.80801 | −0.96721 |
19 | −4.70981 | −7.51113 | −1.30575 | 43 | 3.33290 | −2.43301 | −0.86721 |
20 | −4.57439 | −3.53197 | −2.12867 | 44 | −0.32127 | −2.45801 | −2.14638 |
21 | −6.48064 | 4.44720 | 1.03279 | 45 | 1.40790 | −5.09134 | −3.67138 |
22 | −5.88689 | 0.91595 | −3.83700 | 46 | −2.22960 | −3.02884 | −3.78804 |
23 | −3.93898 | −3.70905 | 1.33487 | 47 | 1.89436 | 2.86908 | −2.35783 |
24 | −5.81398 | 0.52533 | −3.27971 | 48 | 3.12873 | 4.10866 | −3.71721 |
Appendix B
Data | CS | NI | CI | Data | CS | NI | CI |
---|---|---|---|---|---|---|---|
17 April 2022 | 70 | 75 | 46 | 4 December 2022 | 80 | 77 | 51 |
24 April 2022 | 72 | 69 | 51 | 11 December 2022 | 77 | 78 | 51 |
1 May 2022 | 68 | 76 | 47 | 18 December 2022 | 72 | 69 | 47 |
8 May 2022 | 75 | 74 | 55 | 25 December 2022 | 74 | 69 | 53 |
15.May 2022 | 78 | 72 | 52 | 1 January 2023 | 71 | 73 | 50 |
22. May 2022 | 79 | 81 | 59 | 8 January 2023 | 77 | 70 | 52 |
29 May 2022 | 79 | 76 | 64 | 15 January 2023 | 74 | 67 | 54 |
5 June 2022 | 78 | 70 | 61 | 22 January 2023 | 77 | 69 | 52 |
12 June 2022 | 82 | 75 | 50 | 29 January 2023 | 77 | 78 | 55 |
19 June 2022 | 80 | 76 | 53 | 5 February 2023 | 75 | 70 | 55 |
26 June 2022 | 84 | 71 | 49 | 12 February 2023 | 77 | 69 | 53 |
3 July 2022 | 83 | 76 | 50 | 19 February 2023 | 79 | 74 | 52 |
10 July 2022 | 80 | 74 | 47 | 26 February 2023 | 76 | 63 | 50 |
17 July 2022 | 84 | 80 | 49 | 5 March 2023 | 75 | 69 | 49 |
24 July 2022 | 77 | 73 | 50 | 12 March 2023 | 74 | 81 | 52 |
31 July 2022 | 81 | 66 | 48 | 19 March 2023 | 74 | 75 | 47 |
7 July 2022 | 82 | 78 | 50 | 26 March 2023 | 76 | 69 | 53 |
14 August 2022 | 88 | 76 | 49 | 2 April 2023 | 72 | 76 | 48 |
21 August 2022 | 90 | 75 | 48 | 9 April 2023 | 79 | 74 | 56 |
28 August 2022 | 79 | 65 | 45 | 16 April 2023 | 82 | 72 | 54 |
4 September 2022 | 84 | 75 | 49 | 23 April 2023 | 83 | 81 | 61 |
11 September 2022 | 82 | 69 | 50 | 30 April 2023 | 83 | 76 | 65 |
18 September 2022 | 75 | 70 | 48 | 7 May 2023 | 82 | 70 | 63 |
25 September 2022 | 82 | 69 | 47 | 14 May 2023 | 86 | 75 | 51 |
2 October 2022 | 79 | 67 | 47 | 21 May 2023 | 84 | 76 | 54 |
9 October 2022 | 79 | 75 | 48 | 28 May 2023 | 88 | 71 | 51 |
16 October 2022 | 82 | 78 | 47 | 4 June 2023 | 87 | 76 | 52 |
23 October 2022 | 81 | 64 | 47 | 11 June 2023 | 84 | 74 | 49 |
30 October 2022 | 77 | 72 | 47 | 18 June 2023 | 88 | 80 | 50 |
6November 2022 | 80 | 73 | 47 | 25 June 2023 | 80 | 73 | 51 |
13 November 2022 | 79 | 67 | 47 | 2 July 2023 | 85 | 66 | 49 |
20 November 2022 | 80 | 85 | 52 | 9 July 2023 | 86 | 78 | 51 |
27 November 2022 | 80 | 79 | 50 |
References
- Akinbowale, Oluwatoyin Esther, Heinz Eckart Klingelhöfer, and Mulatu Fekadu Zerihun. 2020. Analysis of cyber-crime effects on the banking sector using the balanced score card: A survey of literature. Journal of Financial Crime 27: 945–58. [Google Scholar] [CrossRef]
- Aldasoro, Iñaki, Leonardo Gambacorta, Paolo Giudici, and Thomas Leach. 2022. The drivers of cyber risk. Journal of Financial Stability 60: 100989. [Google Scholar] [CrossRef]
- Al-Dhaqm, Arafat, Shukor Razak, Siti Hajar Othman, Kim-Kwang Raymond Choo, William Bradley Glisson, Abdulalem Ali, and Mohammad Abrar. 2017. CDBFIP: Common Database Forensic Investigation Processes for Internet of Things. IEEE Access 5: 24401–16. [Google Scholar] [CrossRef]
- Bezpartochna, Olesia, and Nataliia Trushkina. 2021. Use of Modern Information Technologies and Digitalization of Business Processes. In Concepts, Strategies and Mechanisms of Economic Systems Management in the Context of Modern World Challenges. Sofia: VUZF University of Finance, Business and Entrepreneurship, pp. 310–22. [Google Scholar]
- Bilan, Yuriy, Tetyana Pimonenko, and Lyudmila Starchenko. 2020. Sustainable business models for innovation and success: Bibliometric analysis. Paper presented at the 1st International Conference on Business Technology for a Sustainable Environmental System (BTSES-2020), Almaty, Kazakhstan, March 19–20; Volume 159, p. 04037. [Google Scholar] [CrossRef] [Green Version]
- Brychko, Maryna, Yuriy Bilan, Serhiy Lyeonov, and Grzegorz Mentel. 2021. Trust crisis in the financial sector and macroeconomic stability: A structural equation modelling approach. Economic Research-Ekonomska Istrazivanja 34: 828–55. [Google Scholar] [CrossRef]
- Bursztynsky, Jessica. 2021. Bank of America Spends Over $1 Billion per Year on Cybersecurity, CEO Brian Moynihan Says. CNBC. June 14. Available online: https://www.cnbc.com/2021/06/14/bank-of-america-spends-over-1-billion-per-year-on-cybersecurity.html (accessed on 5 December 2022).
- Chinnasamy, Gopalakrishnana, Arabya Madbouly, and Sameh Reyad. 2021. Fintech: A Pathway for MENA Region. Studies in Computational Intelligence 935: 135–51. [Google Scholar] [CrossRef]
- Deloitte. 2021. Financial Cyber Survey. Deloitte. July 16. Available online: https://www2.deloitte.com/content/dam/Deloitte/dk/Documents/finance/FSI_cyber.pdf (accessed on 5 December 2022).
- Deloitte Insights. 2019. Pursuing Cybersecurity Maturity at Financial Institutions. Survey Spotlights Key Traits among More Advanced Risk Managers. Results and Analysis from the Second Annual FS-ISAC/Deloitte Cyber Risk Services CISO Survey. Deloitte. March 2. Available online: https://www2.deloitte.com/content/dam/Deloitte/ec/Documents/financial-services/DI_Pursuing-cybersecurity-maturity-at-financial-institutions.pdf (accessed on 5 December 2022).
- Didenko, Iryna, Jolanta Paucz-Olszewska, Serhiy Lyeonov, Anna Ostrowska-Dankiewicz, and Zbigniew Ciekanowski. 2020. Social safety and behavioral aspects of populations financial inclusion: A multicountry analysis. Journal of International Studies 13: 347–59. [Google Scholar] [CrossRef]
- Djamila, Toumi Amara, and Maza Abdelatif. 2022. The Impact of Setting up a Cloud Computing Solution on Small and Medium Organization’s Management: A Qualitative Study. Business Ethics and Leadership 6: 33–38. [Google Scholar] [CrossRef]
- EBA. 2022. Main Drivers of Operational Risk for the Banking Sector in Europe According to European Banks and Analysts in 2022 [Graph]. Statista. June 17. Available online: https://www.statista.com/statistics/1313848/main-drivers-of-operational-risk-among-european-banks/ (accessed on 5 December 2022).
- European Banking Authority. 2019. Final Report. EBA Guidelines on ICT and Security Risk Management. EBA. March 27. Available online: https://www.eba.europa.eu/regulation-and-policy/internal-governance/guidelines-on-ict-and-security-risk-management (accessed on 5 December 2022).
- European Commission. 2018. Communication From The Commission. FinTech Action plan: For a More Competitive and Innovative European Financial Sector. EUR-Lex Access to European Union Law. April 7. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52018DC0109 (accessed on 5 December 2022).
- European Commission. 2021. Financial Services—Improving Resilience against Cyberattacks (New Rules). European Commission. June 20. Available online: https://ec.europa.eu/info/law/betterregulation/have-your-say/initiatives/12090-Digital-Operational-Resilience-of-Financial-Services-DORFS-Act (accessed on 5 December 2022).
- Fernando Alonso Ojeda, Castro. 2021. Cybersecurity, An Axis On Which Management Innovation Must Turn in the 21st Century. SocioEconomic Challenges 5: 98–113. [Google Scholar] [CrossRef]
- Ghazi-Tehrani, Adam Kavona, and Henry N. Pontell. 2021. Phishing Evolves: Analyzing the Enduring Cybercrime. Victims and Offenders 16: 316–42. [Google Scholar] [CrossRef]
- IBM. 2022a. Average Cost of a Data Breach Worldwide from 2014 to 2022 (in Million U.S. Dollars) [Graph]. Statista. July 27. Available online: https://www.statista.com/statistics/987474/global-average-cost-data-breach/ (accessed on 5 October 2022).
- IBM. 2022b. Average Cost of a Data Breach Worldwide from May 2020 to March 2022, by Industry (in Million U.S. Dollars) [Graph]. Statista. July 27. Available online: https://www.statista.com/statistics/387861/cost-data-breach-by-industry/ (accessed on 5 October 2022).
- IBM Security. 2022. X-Force Threat Intelligence Index 2022. IBM. February 23. Available online: https://www.ibm.com/downloads/cas/ADLMYLAZ (accessed on 5 December 2022).
- Insurance Insider. 2018. Estimated Value of Cyber Insurance Premiums Written Worldwide in 2018, 2020 and 2025 (in Billion U.S. Dollars) [Graph]. Statista. September 9. Available online: https://www.statista.com/statistics/976526/global-cyber-insurance-market-size/ (accessed on 5 October 2022).
- Jones, David. 2021. Banks Outpace Other Industries in Cyber Investments, Defense Strategies: Report. Cybersecurity Dive. November 15. Available online: https://www.cybersecuritydive.com/news/banks-cyber-security-investments/610045/ (accessed on 5 December 2022).
- Kirichenko, Lyudmyla, Tamara Radivilova, and Carlsson Anders. 2017. Detecting cyber threats through social network analysis: Short survey. SocioEconomic Challenges 1: 20–34. [Google Scholar] [CrossRef] [Green Version]
- Kobushko, Iana, Inna Tiutiunyk, Ihor Kobushko, Mykola Starinskyi, and Zhanna Zavalna. 2021. The triadic approach to cash management: Communication, advocacy, and legal aspects. Estudios De Economia Aplicada 39: 1–16. [Google Scholar] [CrossRef]
- Kumar, Dharmendra, Darshana Pandey, Aamir Hussain Khan, and Himanshu Nayyar. 2020. Cyber Risk Analysis of Critical Information Infrastructure: (A Quantitative Approach). Paper presented at the 6th International Conference and Exhibition on Smart Grids and Smart Cities, ISUW 2020, New Delhi, India, March 3–7; Volume 847, pp. 1–9. [Google Scholar] [CrossRef]
- Kuzior, Aleksandra, and Paulina Kuzior. 2018. Identity Theft: The Escalation of the Problem—The Multidimensional Consequences. In Von der Agorá zur Cyberworld. Soziale und kulturelle, digitale und nicht-digitale Dimensionen des öffentlichen Raumes. Edited by Hg. Gerhard Banse and Xabier Insausti. Berlin: Trafo, pp. 81–89. [Google Scholar]
- Kuzior, Aleksandra, and Mariya Sira. 2022. A Bibliometric Analysis of Blockchain Technology Research Using VOSviewer. Sustainability 14: 8206. [Google Scholar] [CrossRef]
- Kuzmenko, Olha, Petr Šuleř, Serhiy Lyeonov, Ilze Judrupa, and Anton Boiko. 2020. Data mining and bifurcation analysis of the risk of money laundering with the involvement of financial institutions. Journal of International Studies 13: 332–39. [Google Scholar] [CrossRef]
- Kwilinski, Aleksy. 2019. Implementation of Blockchain Technology in Accounting Sphere. Academy of Accounting and Financial Studies Journal 23: 1–6. [Google Scholar]
- Kyslyy, Volodymyr, Tetyana Bondar, Yevhen Kabluchko, and Hlib Lieonov. 2021. Improving company communication activity amidst the COVID-19 restrictions. Health Economics and Management Review 2: 92–104. [Google Scholar] [CrossRef]
- Leonov, Sergiy, Sergiy Frolov, and Viacheslav Plastun. 2014. Potential of institutional investors and stock market development as an alternative to households’ savings allocation in banks. Economic Annals-XXI 146: 65–68. [Google Scholar]
- Leonov, Serhiy, Hanna Yarovenko, Anton Boiko, and Tetiana Dotsenko. 2019. Information system for monitoring banking transactions related to money laundering. Paper presented at the 8th International Conference on Monitoring, Modeling & Management of Emergent Economy (M3E2-EEMLPEED 2019), Odessa, Ukraine, May 22–24; Volume 2422, pp. 297–307. [Google Scholar]
- Leukfeldt, Rutger, and Robert Roks. 2021. Cybercrimes on the Streets of the Netherlands? An Exploration of the Intersection of Cybercrimes and Street Crimes. Deviant Behavior 42: 1458–69. [Google Scholar] [CrossRef]
- Logan, Winston, and Oleksii Esmanov. 2017. Public financial services transparency. Business Ethics and Leadership 1: 62–67. [Google Scholar] [CrossRef] [Green Version]
- Lyeonov, Serhiy, Joanna Żurakowska-Sawa, Olha Kuzmenko, and Vitaliia Koibichuk. 2020. Gravitational and intellectual data analysis to assess the money laundering risk of financial institutions. Journal of International Studies 13: 259–72. [Google Scholar] [CrossRef]
- Makki, Saraa, Zainabb Assaghir, Yehiac Taher, Rafiquld Haque, Mohand-Saïda Hacid, and Hassan Zeineddine. 2019. An Experimental Study With Imbalanced Classification Approaches for Credit Card Fraud Detection. IEEE Access 7: 93010–22. [Google Scholar] [CrossRef]
- Miskiewicz, Radosław. 2020. Internet of things in marketing: Bibliometric analysis. Marketing and Management of Innovations 3: 371–81. [Google Scholar] [CrossRef]
- Mugarura, Normana, and Emma Ssali. 2020. Intricacies of anti-money laundering and cyber-crimes regulation in a fluid global system. Journal of Money Laundering Control 24: 10–28. [Google Scholar] [CrossRef]
- Naser, Nahidah. 2021. Porter Diamond Model and Internationalization of Fintechs. Financial Markets, Institutions and Risks 5: 51–61. [Google Scholar] [CrossRef]
- National Cyber Security Centre. 2022. Maintaining a sustainable strengthened cyber security posture. National Cyber Security Centre, July 5. Available online: https://www.ncsc.gov.uk/guidance/maintaining-a-sustainable-strengthened-cyber-security-posture(accessed on 5 October 2022).
- NATO. 2022. Cyber Defence. NATO. March 23. Available online: https://www.nato.int/cps/en/natohq/topics_78170.htm (accessed on 5 October 2022).
- Nicholls, Jack, Aditya Kuppa, and Nhien-An Le-Khac. 2021. Financial cybercrime: A comprehensive survey of deep learning approaches to tackle the evolving financial crime landscape. IEEE Access 9: 163965–86. [Google Scholar] [CrossRef]
- Njegovanović, Ana. 2018. Artificial Intelligence: Financial Trading and Neurology of Decision. Financial Markets, Institutions and Risks 2: 58–68. [Google Scholar] [CrossRef]
- Obeid, Hassan, Fatima Hillani, Rana Fakih, and Kholoud Mozannar. 2020. Artificial Intelligence: Serving American Security and Chinese Ambitions. Financial Markets, Institutions and Risks 4: 42–52. [Google Scholar] [CrossRef]
- Pandey, Anand Bhushan, Ashish Tripathi, and Prem Chand Vashist. 2022. A Survey of Cyber Security Trends, Emerging Technologies and Threats. Studies in Computational Intelligence 1007: 19–33. [Google Scholar] [CrossRef]
- Petroye, Olha, Oleksii Lyulyov, Iryna Lytvynchuk, Yurii Paida, and Vladimir Pakhomov. 2020. Effects of information security and innovations on Country’s image: Governance aspect. International Journal of Safety and Security Engineering 10: 459–66. [Google Scholar] [CrossRef]
- Qasaimeh, Malik, Rand Abub Hammour, Muneer Bania Yassein, Raad S. Al-Qassas, Juan Alfonso Larac Torralbo, and David Lizcano. 2022. Advanced security testing using a cyber-attack forecasting model: A case study of financial institutions. Journal of Software: Evolution and Process 34: e2489. [Google Scholar] [CrossRef]
- Rahiman, Habeeb Ur, Nishad Nawaz, Rashmi Kodikal, and A. Hariharasudan. 2021. Effective information system and organisational efficiency. Polish Journal of Management Studies 24: 398–413. [Google Scholar] [CrossRef]
- Sarwar, Musavarah, Muhammad Akram, and Sundas Shahzadi. 2021. Bipolar fuzzy soft information applied to hypergraphs. Soft Computing 25: 3417–39. [Google Scholar] [CrossRef]
- Semenova, K. D., and K. I. Tarasova. 2017. Establishment of the new digital world and issues of cyber-risks management. Marketing and Management of Innovations 3: 236–44. [Google Scholar] [CrossRef] [Green Version]
- Sivakumar, P., V. Jayabalaguru, R. Ramsugumar, and S. Kalaisriram. 2021. Real Time Crime Detection Using Deep Learning Algorithm. Paper presented at the 2021 International Conference on System, Computation, Automation and Networking (ICSCAN), Puducherry, India, July 30–31; pp. 1–5. [Google Scholar] [CrossRef]
- Skrynnyk, Olena. 2021. Literature Review on Social and Organizational Acceptance of Digital Transformation. Business Ethics and Leadership 5: 110–17. [Google Scholar] [CrossRef]
- Statista Research Department. 2022. Cybersecurity—Worldwide. (n.d.). Statista. Available online: https://www.statista.com/outlook/tmo/cybersecurity/worldwide (accessed on 5 October 2022).
- Štrbová, Monika, and Paulina Kuzior. 2019. Safety Management in the Age of Internet Threats. Management Systems in Production Engineering 27: 88–92. [Google Scholar] [CrossRef] [Green Version]
- Stults, Brian J., and Myunghee You. 2021. Self-Control, Cyberbullying, and the Moderating Effect of Opportunity. Deviant Behavior 43: 1267–84. [Google Scholar] [CrossRef]
- The Actuary. 2019. Cybercrime to Cost Global Economy $5.2trn over Five Years. The Actuary. July 26. Available online: https://www.theactuary.com/news/2019/07/2019/07/26/cyber-crime-cost-global-economy-52trn-over-five-years (accessed on 5 December 2022).
- The White House. 2022. FACT SHEET: Act Now to Protect against Potential Cyberattacks. The White House, March 21. Available online: https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/fact-sheet-act-now-to-protect-against-potential-cyberattacks/(accessed on 5 October 2022).
- Tiutiunyk, Inna, Josef Drabek, Nataliia Antoniuk, Valentinas Navickas, and Pavlo Rubanov. 2021a. The impact of digital transformation on macroeconomic stability: Evidence from EU countries. Journal of International Studies 14: 220–34. [Google Scholar] [CrossRef]
- Tiutiunyk, Inna, Yuliia Humenna, and Anna Flaumer. 2021b. Covid-19 impact on business sector activity in the EU countries: Digital issues. Health Economics and Management Review 2: 54–66. [Google Scholar] [CrossRef]
- Tiutiunyk, I. V., A. O. Zolkover, S. V. Lyeonov, and L. B. Ryabushka. 2022. The impact of economic shadowing on social development: Challenges for macroeconomic stability. Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu 1: 183–91. [Google Scholar] [CrossRef]
- Umaselvi, M., E. Menaka, V. Chandrasekar, and D. Saravanapriya. 2022. 5G and IoT Networks Risk Management. In EAI/Springer Innovations in Communication and Computing. Cham: Springer, pp. 47–71. [Google Scholar] [CrossRef]
- United Nations. 2020. Cybersecurity. United Nations. September 9. Available online: https://www.un.org/counterterrorism/cct/programme-projects/cybersecurity (accessed on 5 October 2022).
- Vasylyev, Yuriy, Iryna Savchenko, Yana Us, and Regina Veckalne. 2021. Generating Confidence in the Healthcare System through Information Activities of Healthcare Institutions. Health Economics and Management Review 2: 38–51. [Google Scholar] [CrossRef]
- Vojinovic, Ivana. 2022. More Than 70 Cybercrime Statistics—A $6 Trillion Problem. DataProt. October 4. Available online: https://dataprot.net/statistics/cybercrime-statistics/ (accessed on 5 October 2022).
- Vysochyna, Alina, Olena Kryklii, Mariia Minchenko, Aliyeva Aygun Aliyeva, and Kateryna Demchuk. 2020. Country innovative development: Impact of shadow economy. Marketing and Management of Innovations 4: 41–49. [Google Scholar] [CrossRef]
- Yarovenko, Hanna, Yuriy Bilan, Serhiy Lyeonov, and Grzegorz Mentel. 2021. Methodology for assessing the risk associated with information and knowledge loss management. Journal of Business Economics and Management 22: 369–87. [Google Scholar] [CrossRef]
- Zadorozhnyi, Zenovii-Mykhaylo, Volodymyr Muravskyi, Oleg Shevchuk, and Mykhailo Bryk. 2021. Innovative accounting methodology of ensuring the interaction of economic and cybersecurity of enterprises. Marketing and Management of Innovations 4: 36–46. [Google Scholar] [CrossRef]
Criteria and Conclusions | CS | NI | CI |
---|---|---|---|
F Calculated | 4.6901 | 1.1489 | 1.8905 |
F Critical | 1.3374 | 1.3374 | 1.3374 |
The result of the hypothesis testing for the series homogeneity | Homogeneity hypothesis is rejected. | Homogeneity hypothesis is accepted. | Homogeneity hypothesis is rejected. |
t Calculated | 9.1187 | 2.3558 | 18.5668 |
t Critical | 1.9692 | 1.9692 | 1.9692 |
The result of the hypothesis testing regarding the absence of a trend | The trend is present. | The trend is present. | The trend is present. |
Indicator | Model | Model Features |
---|---|---|
Cyberattacks on Computer Systems of a Financial Institution | Model 1 | Additive season (48); S0 = 62.42; No trend; Alpha = 1.00; Delta = 1.00 |
Model 2 | Additive season (48); S0 = 57.50; T0 = 0.0815; Linear trend; Alpha = 1.00; Delta = 1.00; Gamma = 0.00 | |
Model 3 | Additive season (48); S0 = 60.70; T0 = 0.9991; Exponential trend; Alpha = 1.00; Delta = 1.00; Gamma = 0.00 | |
Model 4 | Multiplicative season (48); S0 = 62.42; No trend; Alpha = 0.883; Delta = 0.125 | |
Model 5 | Multiplicative season (48); S0 = 57.50; T0 = 0.0815; Linear trend; Alpha = 0.887; Delta = 0.109; Gamma = 0.00 | |
Model 6 | Multiplicative season (48) S0 = 60.70; T0 = 0.9991; Exponential trend; Alpha = 0.887; Delta = 0.114; Gamma = 0.00 | |
Cyberattacks on the Network Infrastructure of a Financial Institution | Model 1 | Additive season (48); S0 = 53.90; No trend; Alpha = 0.569; Delta = 0.00 |
Model 2 | Additive season (48); S0 = 56.88; T0 = −0.012; Linear trend; Alpha = 0.564; Delta = 0.00; Gamma = 0.00 | |
Model 3 | Additive season (48); S0 = 58.86; T0 = 0.9984; Exponential trend; Alpha = 0.573; Delta = 0.00; Gamma = 0.00 | |
Model 4 | Additive season (48); S0 = 74.05; T0 = −0.728; Damped trend; Alpha = 0.361; Delta = 0.00; Phi = 0.017 | |
Model 5 | Multiplicative season (48); S0 = 53.90; No trend; Alpha = 0.518; Delta = 0.00 | |
Model 6 | Multiplicative season (48); S0 = 56.88; T0 = −0.012; Linear trend; Alpha = 0.518; Delta = 0.00; Gamma = 0.00 | |
Model 7 | Multiplicative season (48); S0 = 58.86; T0 = 0.9984; Exponential trend; Alpha = 0.527; Delta = 0.00; Gamma = 0.00 | |
Model 8 | Multiplicative season (48); S0 = 71.43; T0 = −0.618; Damped trend; Alpha = 0.328; Delta = 0.00; Phi = 0.020 | |
Cyberattacks on the Cloud Infrastructure of a Financial Institution | Model 1 | Additive season (48); S0 = 33.73; No trend; Alpha = 0.763; Delta = 0.00 |
Model 2 | Additive season (48); S0 = 25.94; T0 = 0.0667; Linear trend; Alpha = 0.756; Delta = 0.00; Gamma = 0.00 | |
Model 3 | Additive season (48); S0 = 27.21; T0 = 1.000; Exponential trend; Alpha = 0.761; Delta = 0.00; Gamma = 0.00 | |
Model 4 | Multiplicative season (48); S0 = 33.73; No trend; Alpha = 1.00; Delta = 1.00 | |
Model 5 | Multiplicative season (48); S0 = 25.94; T0 = 0.0667; Linear trend; Alpha = 1.00; Delta = 1.00; Gamma = 0.00 | |
Model 6 | Multiplicative season (48); S0 = 27.21; T0 = 1.000; Exponential trend; Alpha = 0.815; Delta = 0.00; Gamma = 0.00 |
Error Name | Model 1 | Model 2 | Model 3 | Model 4 | Model 5 | Model 6 |
---|---|---|---|---|---|---|
Mean Error | 0.0539 | −0.0088 * | 0.1152 | 0.0229 | −0.0472 | 0.0917 |
Mean Absolute Error | 4.3026 | 4.2923 * | 4.2948 | 4.3488 | 4.3289 | 4.3471 |
Mean Square Error | 31.3206 | 31.2654 | 31.2653 * | 35.7870 | 35.6338 | 35.6815 |
Mean Percentage Error | −0.3187 | −0.4186 | −0.2200 * | −0.4462 | −0.5556 | −0.3336 |
Mean Absolute Percentage Error | 6.9939 | 6.9803 | 6.9776 * | 7.0286 | 6.9983 | 7.0197 |
Error Name | Model 1 | Model 2 | Model 3 | Model 4 | Model 5 | Model 6 | Model 7 | Model 8 |
---|---|---|---|---|---|---|---|---|
Mean Error | 0.1481 | 0.1503 | 0.2695 | 0.0162 * | 0.0476 | 0.0507 | 0.1810 | −0.0699 |
Mean Absolute Error | 5.9178 | 5.9115 | 5.9130 | 5.8966 * | 5.9721 | 5.9706 | 5.9709 | 5.9698 |
Mean Square Error | 57.4386 | 56.9725 | 56.6455 | 55.7306 * | 61.2920 | 60.9472 | 60.6463 | 60.2038 |
Mean Percentage Error | −1.1104 | −1.1033 | −0.8663 * | −1.2791 | −1.3870 | −1.3739 | −1.1162 | −1.5270 |
Mean Absolute Percentage Error | 11.3017 | 11.2936 | 11.2782 * | 11.2887 | 11.3923 | 11.3905 | 11.3712 | 11.4027 |
Error Name | Model 1 | Model 2 | Model 3 | Model 4 | Model 5 | Model 6 |
---|---|---|---|---|---|---|
Mean Error | 0.0812 | 0.0332 * | 0.0915 | 0.0430 | 0.0052 * | 0.0692 |
Mean Absolute Error | 4.4419 | 4.4221 | 4.4229 | 4.6343 | 4.6063 | 4.3387 * |
Mean Square Error | 41.5554 | 41.4867 | 41.4841 * | 45.5725 | 45.3386 | 44.1604 |
Mean Percentage Error | −1.6617 | −1.7840 | −1.5980 * | −1.6119 | −1.7041 | −1.6788 |
Mean Absolute Percentage Error | 13.4378 | 13.3832 | 13.3663 | 13.9018 | 13.8019 | 12.914 3* |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kuzior, A.; Brożek, P.; Kuzmenko, O.; Yarovenko, H.; Vasilyeva, T. Countering Cybercrime Risks in Financial Institutions: Forecasting Information Trends. J. Risk Financial Manag. 2022, 15, 613. https://doi.org/10.3390/jrfm15120613
Kuzior A, Brożek P, Kuzmenko O, Yarovenko H, Vasilyeva T. Countering Cybercrime Risks in Financial Institutions: Forecasting Information Trends. Journal of Risk and Financial Management. 2022; 15(12):613. https://doi.org/10.3390/jrfm15120613
Chicago/Turabian StyleKuzior, Aleksandra, Paulina Brożek, Olha Kuzmenko, Hanna Yarovenko, and Tetyana Vasilyeva. 2022. "Countering Cybercrime Risks in Financial Institutions: Forecasting Information Trends" Journal of Risk and Financial Management 15, no. 12: 613. https://doi.org/10.3390/jrfm15120613
APA StyleKuzior, A., Brożek, P., Kuzmenko, O., Yarovenko, H., & Vasilyeva, T. (2022). Countering Cybercrime Risks in Financial Institutions: Forecasting Information Trends. Journal of Risk and Financial Management, 15(12), 613. https://doi.org/10.3390/jrfm15120613