The study investigates cybersecurity challenges in Nigerian deposit money banks (DMBs) with a focus on proactive measures taken by banks and customers to overcome these challenges. The research design employs a descriptive approach and census sampling, with data collected from staff of selected DMBs using questionnaires. Data analysis was conducted using SPSS, and findings indicate that the major challenges confronting cybersecurity in banks were pharming, identity theft, SIM Swap fraud, Skimming/Website cloning and Smishing/Vishing. The major factors responsible were found to include loopholes in the banks’ internal control system, insider abuse by bank staff, ignorance and lack of security consciousness among the banking customers etc. it was found that banks implement measures such as encryption, password changes, and blocking unsolicited messages to mitigate cybersecurity risks. The study concludes with recommendations for continuous security updates, internal control reviews, and customer education campaigns. While the study addresses an important topic, there are areas where clarity, depth, and methodological rigor could be strengthened for a more robust contribution to the field.
References
[1]
Ibinkule, F. and Enweniyi, E. (2013) Approaches to Cyber Security Issues in Nigeria. Journal of Cognitive Research in Science, Engineering and Education, 1, 100-110. https://ijcrsee.com/index.php/ijcrsee/article/view/65
[2]
Bromwich, J.E. (2016) Protecting Your Digital Life in 7 Easy Steps. New York Times.
[3]
Onwubiko, C.O. and Nwankwo, H.A. (2019) Cyber Security Challenge: Roles of Managers and Business Executives. Journal of Accounting Information and Innovation, 5, 1-8.
[4]
National Institute of Standard and Technology (2014) A Comprehensive Analysis and Performance Enhancement for IEEE 802 11 AY Group. https://dspace.networks.imdea.org/bitstream/handle/20.500.12761/1585/WoWMoM_2022_camera-ready.pdf?sequence=1
Kolade, E. (2022) Cybersecurity in Nigeria’s Financial Industry: Enhancing Consumer Trust and Security. https://eucyberdirect.eu/atlas/sources/cybersecurity-in-nigeria-s-financial-industry-enhancing-consumer-trust-and-security
[7]
Soni, V.D. (2019) Role of Artificial Intelligence in Combating Cyber Threats in Banking. International Engineering Journal for Research & Development, 4, 1-7. https://ssrn.com/abstract=3654422
Ololade, B.M., Salawu, M.K. and Adekanmi, A.D. (2020) E-Fraud in Nigerian Banks: Why and How? Journal of Financial Risk Management, 9, 211-228. https://doi.org/10.4236/jfrm.2020.93012
[10]
Nigeria Inter-Bank Settlement System (2021) Fraud Report for Quarter 3. National Cybersecurity Policy and Strategy. Nigerian Government, February 2021. https://cert.gov.ng/ngcert/resources/NATIONAL_CYBERSECURITY_POLICY_AND_STRATEGY_2021.pdf
[11]
African Academic Network on Internet Policy (2020) Critical Data Security Issues in the Nigeria Banking Sector. African Academic Network on Internet Policy. https://aanoip.org/critical-data-security-issues-in-the-nigerian-banking-sector/
[12]
Ogunwale, H. (2020) The Impact of Cybercrime on Nigeria’s Commercial Banking System. https://www.researchgate.net/profile/Hezekiah-Ogunwale/publication/347388290_THE_IMPACT_OF_CYBERCRIME_ON_NIGERIA'S_COMMERCIAL_BANKING_SYSTEM/links/5fda6c7392851c13fe90a613/THE-IMPACT-
[13]
Federal Bureau of Investigation (1984) Uniform Crime Reports. U.S. Government Printing Office. https://www.ojp.gov/ncjrs/virtual-library/abstracts/crime-united-states-1984
[14]
Eseoghene, J.I. (2010) Bank Frauds in Nigeria: Underlying Causes, Effects, and Possible Remedies. African Journal of Accounting & Economics, Finance & Banking Research, 6, 62-80. http://ajaefbr.com/articles/african-vol6-article5.pdf
[15]
Israel, A. and Ebenezer, A. (2023) Analysis and Management of Fraud in Nigerian Banking Industry: Stakeholders’ Perspectives. Fountain University Osogbo Journal of Management, 4, 47-60.
[16]
Amar, J. and Shailendra, K. (2023) Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation. Human Behavior and Emerging Technologies, 2023, Article ID: 2103442. https://doi.org/10.1155/2023/2103442
[17]
Ibor, B. (2016) An Investigation of Human Resources Nexus to Frauds in the Nigerian Banking Sector. International Journal of Scientific and Research Publications, 6, 231-247. https://www.scirp.org/(S(351jmbntvnsjt1aadkozje))/reference/referencespapers.aspx?referenceid=2819469
[18]
Olumide, O.O. and Victor, F.B. (2010) E-Crime in Nigeria: Trends, Tricks, and Treatment. The Pacific Journal of Science and Technology, 11, 343-356. https://www.semanticscholar.org/paper/E-Crime-in-Nigeria%3A-Trends%2C-Tricks%2C-and-Treatment.-Balogun-Obe/f1645526cec00bddc562bcffc4179ad2c9cad919
[19]
Central Bank of Nigeria (2021) (Various Issues). Statistical Bulletins. https://www.cbn.gov.ng/documents/statbulletin.asp
[20]
Patel, S. (2021) Aspects of Artificial Intelligence. In: Karthikeyan, J., Ting, S.-H. and Ng, Y.-J., Eds., Learning Outcomes of Classroom Research, L’Ordine Nuovo Publication, 48-55.
[21]
Hitansh, K. (2023) Transformative Impact of AI and ML in Cyber Security. Vulnerability Management. https://www.linkedin.com/pulse/transformative-impact-ai-ml-cybersecurity-hitansh-kataria-e0sdc/
[22]
Patel, H. (2023) The Future of Cybersecurity with Artificial Intelligence (AI) and Machine Learning (ML). Computer Science and Engineering, 25, 425-429. https://doi.org/10.20944/preprints202301.0115.v1
[23]
Aamir, A.A., Ali, O., Razwan, M. and Ahmed, F. (2020) Using Block to Boost Cybersecurity. Journal of Natural and Applied Sciences, 2, 301-314.
[24]
Traina, L. (2018) The Top 5 Cybersecurity Risks for CPAs. AICPA Store. https://us.aicpa.org/content/dam/aicpa/interestareas/informationtechnology/resources/privacy/cybersecurity/downloadabledocuments/top-5-cybercrimes.pdf
[25]
Hoffmann, A.O. and Birnbrich, C. (2012) The Impact of Fraud Prevention on Bank-Customer Relationships: An Empirical Investigation in Retail Banking. International Journal of Bank Marketing, 30, 390-407. https://doi.org/10.1108/02652321211247435
[26]
Elumaro, A.J. and Obamuyi, T.M. (2018) Cards Frauds and Customers’ Confidence in Alternative Banking Channels in Nigeria. European Scientific Journal, 14, 40-60. https://doi.org/10.19044/esj.2018.v14n16p40
[27]
Rad, H.A., Tehrani, M.B., Samsidin, K. and Ramli, A.R. (2009) A Simple and Highly Secure Protocol for POS Terminal. 2009 Second International Conference on Environmental and Computer Science, Dubai, 28-30 December 2009, 204-207. https://doi.org/10.1109/ICECS.2009.42
[28]
Kosutic, D. (2021) The Impact of Cybersecurity on Competitive Advantage. https://www.researchgate.net/publication/357826918_The_Impact_of_Cybersecurity_on_Competitive_Advantage
[29]
Enofe, A.O., Abilogun, T.O., Omoolorun, A.J. and Elaiho, E.M. (2017) Bank Fraud and Preventive Measures in Nigeria: An Empirical Review. International Journal of Academic Research in Business and Social Sciences, 7, 40-51.
[30]
Akinyomi, O.J. (2012) Examination of Fraud in the Nigerian Banking Sector and Its Prevention. Asian Journal of Management Research, 3, 184-192. https://www.scirp.org/(S(351jmbntvnsjt1aadkozje))/reference/referencespapers.aspx?referenceid=2819460
[31]
Geatano, D. (2022) Can Someone Hack Your Phone with Just Your Number? https://www.aura.com/learn/what-can-hackers-do-with-your-phone-number
[32]
Norton (2024) How to Stop Spam Texts: An Easy 4-Step Guide. https://www.norton360.org/how-to-stop-spam-texts-An-easy-4-step-guide
[33]
Albrecht, C., Albrecht, C.C. and Wareham, J. (2008) The Role of Power and Negotiation in Online Fraud. Journal of Digital Forensics, Security and Law, 1, 29-48. https://www.scirp.org/(S(351jmbntvnsjt1aadkozje))/reference/referencespapers.aspx?referenceid=2819461
[34]
Wolfe, D.T. and Hermanson, D.R. (2004) The Fraud Diamond: Considering the Four Elements of Fraud. The CPA Journal, 74, 38-42. https://doi.org/10.1016/S1361-3723(04)00077-6
[35]
Babatunde, O., Salawu, M. and Adekanmi, A. (2020) E-Fraud in Nigerian Banks: Why and How? Journal of Financial Risk Management, 9, 211-228. https://doi.org/10.4236/jfrm.2020.93012
[36]
Schweitzer, M.E. (1997) Omission, Friendship, and Fraud: Lies about Material Facts in Negotiation. Annual Meeting of Academic Management. https://doi.org/10.1037/e683282011-011
[37]
Grazioli, S. and Jarvenpaa, S.L. (2003) Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence. International Journal of Electronic Commerce, 7, 93-118. https://doi.org/10.1080/10864415.2003.11044283
[38]
Kaibairu, R.M., Karume, S.M., Kibas, F. and Onga’nyo M.L.B. (2017) Closing the Cybsersecurity Skill in Kenya: Curriculum Intervention in Higher Education. Journal of Information Security, 14, 136-151. https://www.scirp.org/reference/referencespapers?referenceid=3429404
[39]
Ikegwu, J., Nnatuanya, B., Okoli, C. and Ndukwe, I. (2022) Africa’s Evolving Cyber Threat Landscape. https://phillipsconsulting.net/reports_post/africas-evolving-cyber-threats-landscape/