What Hinders Adoption of Artificial Intelligence for Cybersecurity in the Banking Sector DOI Creative Commons
Aishatu Garga Ali, Mahmood Shah

Information, Journal Year: 2024, Volume and Issue: 15(12), P. 760 - 760

Published: Nov. 29, 2024

AI-enabled cybersecurity systems are becoming common, but their effectiveness is reported to be mixed at best due some barriers. The primary objective of this systematic literature review find barriers associated with the use systems. A comprehensive approach was implemented in study. Literature sampled from different databases (Scopus and WOS) synthesised synthesise using an system, a total 41 papers were selected inclusion criteria. study identified several barriers, such as complexity systems, lack top management support, AI-proficient employees, regulatory support for AI. These classified into technological, organisational, environmental. This paper unique it focuses on advanced technologies expert cybersecurity. Thus, current research makes novel contribution, arguing that attention required toward organisational-level issues protect system cyberattacks. will establish way researchers evaluate these opening new avenues empirical practitioners utilise more effectively.

Language: Английский

Exploring Privacy Leakage in Platform-Based Enterprises: A Tripartite Evolutionary Game Analysis and Multilateral Co-Regulation Framework DOI Creative Commons
Peng Xu, Jiaxin Li, Zhuo Sun

et al.

Information, Journal Year: 2025, Volume and Issue: 16(3), P. 193 - 193

Published: March 2, 2025

Currently, some platform-based enterprises are selling users’ private information to capture high revenue, which poses a great threat privacy and security also challenge the work of regulators. This paper constructs tripartite evolutionary game model among enterprises, users, regulators by combining theories daily activities. explores equilibrium strategy for leakage on online platforms under concept multiparty governance designs four simulation experiments based revenue intervals enterprises’ decisions. Finally, is validated means simulation. The results show that when make less profit from compromising privacy, users motivated participate in shared with minimal incentives regulator. Regulators can effectively deter fining leaking user requiring them compensate their losses. At this point, they achieve effective control over using traditional regulation. When profits will adhere strategy. at its most serious, rights not protected. Users tend cooperate form regulatory system, but does influence choice enterprises.

Language: Английский

Citations

0

Strengthening Cybersecurity Resilience: An Investigation of Customers’ Adoption of Emerging Security Tools in Mobile Banking Apps DOI Creative Commons

Irfan Riasat,

Mahmood Shah, M. Sinan Gönül

et al.

Computers, Journal Year: 2025, Volume and Issue: 14(4), P. 129 - 129

Published: April 1, 2025

The rise in internet-based services has raised risks of data exposure. manipulation and exploitation sensitive significantly impact individuals’ resilience—the ability to protect prepare against cyber incidents. Emerging technologies seek enhance cybersecurity resilience by developing various security tools. This study aims explore the adoption tools using a qualitative research approach. Twenty-two semi-structured interviews were conducted with users mobile banking apps from Pakistan. Data analyzed thematic analysis, which revealed that biometric authentication SMS alerts are commonly used. Limited use multifactor been observed, mainly due lack awareness or implementation knowledge. Passwords still regarded as trusted secure mechanism. findings indicate is based on perceptions usefulness, perceived trust, ease use, while knowledge play moderating role. also proposes framework extending TAM include multiple introducing moderator influencing users’ perceptions. inform practical implications for financial institutions, application developers, policymakers ensure standardized policy online platforms, thereby enhancing overall resilience.

Language: Английский

Citations

0

AI Integration in Public Administration DOI
Andi Asrifan,

Akbar Akbar,

Muhammad Nur

et al.

Advances in public policy and administration (APPA) book series, Journal Year: 2025, Volume and Issue: unknown, P. 95 - 122

Published: Feb. 14, 2025

This chapter examines how AI might alter public administration by improving efficiency, accessibility, and decision-making. automates ordinary jobs, freeing up servants for high-impact work. Predictive analytics improve government operations offering data-driven insights resource allocation preemptive actions in healthcare, urban planning, safety. Chatbots virtual assistants make services more accessible to different populations, especially those with linguistic or physical obstacles. The also highlights the ethical operational issues of administration. Due data privacy, security, algorithmic bias, deployment must be transparent, accountable, fair. Public entities can ethically use following governance guidelines gaining trust. emphasizes balanced establish an inclusive, efficient, citizen-centered, adaptable sector.

Language: Английский

Citations

0

What Hinders Adoption of Artificial Intelligence for Cybersecurity in the Banking Sector DOI Creative Commons
Aishatu Garga Ali, Mahmood Shah

Information, Journal Year: 2024, Volume and Issue: 15(12), P. 760 - 760

Published: Nov. 29, 2024

AI-enabled cybersecurity systems are becoming common, but their effectiveness is reported to be mixed at best due some barriers. The primary objective of this systematic literature review find barriers associated with the use systems. A comprehensive approach was implemented in study. Literature sampled from different databases (Scopus and WOS) synthesised synthesise using an system, a total 41 papers were selected inclusion criteria. study identified several barriers, such as complexity systems, lack top management support, AI-proficient employees, regulatory support for AI. These classified into technological, organisational, environmental. This paper unique it focuses on advanced technologies expert cybersecurity. Thus, current research makes novel contribution, arguing that attention required toward organisational-level issues protect system cyberattacks. will establish way researchers evaluate these opening new avenues empirical practitioners utilise more effectively.

Language: Английский

Citations

2