Internet banking fraud alertness in the banking sector: South Africa
-
DOIhttp://dx.doi.org/10.21511/bbs.12(1-1).2017.07
-
Article InfoVolume 12 2017, Issue #1 (cont.), pp. 143-151
- Cited by
- 1835 Views
-
655 Downloads
This work is licensed under a
Creative Commons Attribution-NonCommercial 4.0 International License
This paper analyzes internet banking fraud alertness to the general public by the South African banking institutions. The study is centered on routine activity theory, which is a criminology theory. A qualitative content analysis was used as the research technique for the interpretation of the text data from each bank’s website through the systematic classification process of coding and identifying themes or patterns to provide an in-depth understanding of internet banking fraud alertness in the banking sector. A sample size of 13 out of 16 locally and foreign controlled retail banks in South Africa was used. The findings report that banks are not adequately providing internet fraud alertness information to the general public on their websites notwithstanding that most banks they do provide such information to log-in users and the use of that information is doubtful. This study suggests a need to augment internet banking fraud alertness information and passably inform internet banking users of the types of internet banking fraud perpetrated by internet fraudsters before they log-in for transacting. Considering the current and widespread quandary of internet banking fraud, the information of this paper is important for internet banking users to improve their aptitude in identifying fraudulent schemes and circumvent them, and for the banking institutions to invest more in the provision of internet banking fraud information to the general public.
- Keywords
-
JEL Classification (Paper profile tab)G21, D18
-
References39
-
Tables4
-
Figures4
-
- Fig. 1. Internet banking fraud type – bar chart
- Fig. 2. Internet banking fraud type – similarity index
- Fig. 3. Internet banking fraud type alertness ‒ crosstab matrix (Banks 1-6)
- Fig. 4. Internet banking fraud type alertness – crosstab matrix (Banks 7-13)
-
- Table 1. Internet and digital banking fraud type’s awareness frequencies
- Table 2. Internet banking fraud type – co-occurrence similarity matrix (Ochiai’s coefficient)
- Table 3. Internet banking fraud type ‒ similarity matrix
- Table 4. Internet banking fraud type alertness ‒ crosstab matrix
-
- 1. Anderson, K. B., Durbin, E., & Salinger, M. A. (2008). Identity Theft. Journal of Economic Perspectives, 22(2), 171-192.
- 2. Australian High Tech Crime Centre. (2010). Internet fraud and scams. SEC Webpage.
- 3. Chang, J. J. S. (2008). An analysis of advance fee fraud on the internet. Journal of Financial Crime, 15(1), 71-81.
- 4. Cohen, F. (2003). Internet fraud: Mythical online scams. Computer Fraud and Security, 4, 19.
- 5. Deloitte. (2015). India Banking Fraud Survey, Edition II, April 2015. Deloitte Touche Tohmatsu India Private Limited.
- 6. Deybach, G. (2007). Identity Theft and Employer Liability. Risk Management, 54, 14.
- 7. Dlamini, Z., & Modise, M. (2012). Cyber security awareness initiatives in South Africa: a synergy approach. In 7th International Conference on Information Warfare and Security. Academic Conferences International. Retrieved from http://hdl.handle.net/10204/5941.
- 8. Dinev, T. (2006). Why spoofing is serious internet fraud. Communications of the ACM, 49(10), 76-82.
- 9. Elufisan, T. O. (2012). Combating Cyber-Fraud in a Cashless Economy: The Role (Relevance) of Biometric System. SSRN Electronic Journal.
- 10. Farmer, R. (2003). FFIEC Supplemental Guidance to Authentication in an Internet Banking Environment. Whitepaper, FIS Enterprise Governance, Risk and Compliance (EGRC) Solutions.
- 11. Felten, E. et al. (1997). Web spoofing: An internet con game. Software World, 28(2), 1-9.
- 12. First Bank. (2014). Internet Banking Awareness and Education Program. Retail/Consumer awareness program
- 13. Georgescu, M. (2005). Some Issues about Risk Management for E-Banking.
- 14. Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans., 30(4), 395-410.
- 15. Grobler, M., Flowerday, S., von Solms, R., and Venter, H. (2011). Cyber Awareness Initiatives in South Africa: A National Perspective. Proceedings of Southern African Cyber Security Awareness Workshop (SACSAW) 2011. Gaborone, Botswana12 May 2011.
- 16. Hinde, S. (2005). Identity theft & fraud. Computer Fraud and Security, 6, 18-20.
- 17. Holt, T. & Graves, D. C. (2007). A qualitative analysis of advance fee fraud e-mail schemes. International Journal of Cyber Criminology, 1(1), 1-13.
- 18. Indiana Bankers Association. (2012). Electronic Fraud Awareness Advisory. Fraud Awareness Task Force February, 2012, 1-5.
- 19. Kigerl, A. (2012). Routine Activity Theory and the Determinants of High Cybercrime Countries. Social Science Computer Review, 30(4), 470-486.
- 20. Khin, E. (2009). Employing Artificial Intelligence to Minimize Internet Fraud. International Journal of Cyber Society and Education, 2(1), 61-72.
- 21. Ladan, M. (2003). An overview of e-commerce technologies and challenges. ACS/IEEE International Conference on Computer Systems and Applications, 2003. Book of Abstracts.
- 22. Lawrence E. (1979). Cohen and Marcus Felson, American Sociological Review, 44(4), (Aug., 1979), 588-608. Published by: American Sociological Association Article Stable.
- 23. McGuire, M., and Dowling, S. (2013). Cyber-crime: A review of the evidence Research Report 75, Chapter 2: Cyber-enabled crimes-fraud and theft. Home Office, 1-27.
- 24. Miró, F. (2014). Routine activity theory. The Encyclopedia of Theoretical Criminology, 1-7.
- 25. Newman, R. C. (2006). Cybercrime, Identity Theft, and Fraud: Practicing Safe Internet - Network Security Threats and Vulnerabilities. In Proceedings of the 3rd annual conference on Information security curriculum development (InfoSec2006), 68-78.
- 26. OECD. (2008). OECD Policy Guidance on Online Identity Theft. OECD Ministerial Meeting on the Future on Internet Economy. Seoul, Korea, 17-18 June, 2008. Korea Communications Commission.
- 27. Osford Ogis. (2012). Impact of Fraud on E-Commerce: Proposed new Technologies to Combat Internet Fraud. Interdisciplinary Journal of Contemporary Research in Business, 4(3), 634-640.
- 28. Perumal, S. A. (2008). Impact of Cyber Crime on Virtual Banking. SSRN Electronic Journal.
- 29. Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory. Journal of Research in Crime and Delinquency, 47(3), 267-296.
- 30. Redelinghuis, A., & Rensleigh, C. (2010). Customer perceptions on Internet banking information protection. SA Journal of Information Management, 12(1), Art. #444, 6. DOI: 10.4102/sajim.v12i1.444
- 31. Schuckers, S. A. C. (2002). Spoofing and Anti-Spoofing Measures. Information Security Technical Report, 7(4), 56-62.
- 32. Shouming, C., & Bin, Z. (2009). How to cope with fraud of trusted third party in E-commerce: An analysis based on evolutionary game theory. In 2009 WASE International Conference on Information Engineering, ICIE 2009, 61-64.
- 33. Stoica, E., & Brote, V. (2012). New Technologies Shaping the E-Commerce Environment. Revista Economică, Supplement, 379-385.
- 34. South African Reserve Bank. (2015). South African Registered Banks and Representative Offices.
- 35. Tewksbury, R. A., and Mustaine, E. E. (2010). Encyclopedia of Criminological Theory: Cohen, Lawrence E., and Marcus K. Felson: Routine Activity Theory. In Contributors: Francis T. Cullen & Pamela Wilcox (Eds.), Encyclopedia of Criminological Theory, 187-193.
- 36. US-CERT. (2008). Banking Securely Online. Produced 2006 by US-CERT, a government organization. Updated 2008.
- 37. Wang, X. H. (2010). The security technologies of web services for e-commerce. In 2010 International Conference on E-Product E-Service and E-Entertainment, ICEEE2010.
- 38. Yar, M. (2005). The Novelty of “Cybercrime”: An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2(4), 407-427.
- 39. York, D. (2010). Identity, Spoofing, and Vishing. In Seven Deadliest Unified Communications Attacks. Syngress, 117-136.