What matters for financial inclusions? Evidence from emerging economy

被引:8
作者
Khan, Anum [1 ]
Mubarik, Muhammad Shujaat [2 ,3 ]
Naghavi, Navaz [3 ]
机构
[1] Muhammad Ali Jinnah Univ, Dept Finance, Karachi 75000, Pakistan
[2] Inst Business Management, Coll Business Management, Karachi, Pakistan
[3] Taylors Univ, Sch Accounting & Law, Subang Jaya, Malaysia
关键词
banking sector; cybercrimes; cybersecurity; financial inclusion; PLS‐ SEM; SECURITY; BANKING; CHALLENGES; MANAGEMENT; MODEL;
D O I
10.1002/ijfe.2451
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
The major objective of this research is to examine the influence of cybercrimes on financial inclusion in a developing country. Furthermore, the study also tends to examine the role of cybersecurity in controlling the impact of cybercrimes on financial inclusion. Data were collected from the banking sector of Pakistan using a close-ended questionnaire. Partial least square-structural equation modelling (PLS-SEM) technique was employed to analyse the data. The findings of the study confirm that strong cybersecurity reduces the consequences of cyber threats to financial inclusion. This study suggests that numerous external and internal factors lead to criminals for illegal activities in the banking sector. Therefore, it is obligatory for the banks to enhance their cybersecurity control, to minimize the occurrences of cyber-attacks. The present study focuses on the banking sector, so its finding cannot be generalized in other sectors. Further in-depth comparative studies in other sectors with different cultural settings will help to authenticate the research findings.
引用
收藏
页码:821 / 838
页数:18
相关论文
共 77 条
[1]   Can technology bridge the gap between rural development and financial inclusions? [J].
Agwu, M. E. .
TECHNOLOGY ANALYSIS & STRATEGIC MANAGEMENT, 2021, 33 (02) :123-133
[2]   Towards a Formal Foundation of Web Security [J].
Akhawe, Devdatta ;
Barth, Adam ;
Lam, Peifung E. ;
Mitchell, John ;
Song, Dawn .
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, :290-304
[3]   Estimating Causes of Cyber Crime: Evidence from Panel Data FGLS Estimator [J].
Al-Suwaidi, Noura ;
Nobanee, Haitham ;
Jabeen, Fauzia .
INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2018, 12 (02) :392-407
[4]  
Anderson DE, 2013, VETERINARY TECHNIQUES FOR LLAMAS AND ALPACAS, P265
[5]   Security awareness of computer users: A phishing threat avoidance perspective [J].
Arachchilage, Nalin Asanka Gamagedara ;
Love, Steve .
COMPUTERS IN HUMAN BEHAVIOR, 2014, 38 :304-312
[6]  
Arner DW, 2017, NW J INT LAW BUS, V37, P371
[7]   Does information security attack frequency increase with vulnerability disclosure? An empirical analysis [J].
Arora, Ashish ;
Nandkumar, Anand ;
Telang, Rahul .
INFORMATION SYSTEMS FRONTIERS, 2006, 8 (05) :350-362
[8]  
Aseef N., 2005, CISC VIS NETW IND GL
[9]  
Aziz ASA, 2012, INFORM-J COMPUT INFO, V36, P347
[10]  
Balan S., 2017, INFORM TECHNOLOGY MA, V20, P64, DOI DOI 10.1515/ITMS-2017-0011