Cybersecurity threats in FinTech: A systematic review

被引:8
作者
Javaheri, Danial [1 ]
Fahmideh, Mahdi [2 ]
Chizari, Hassan [3 ]
Lalbakhsh, Pooia [4 ]
Hur, Junbeom [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 02841, South Korea
[2] Univ Southern Queensland, Sch Business, Springfield, Qld 4300, Australia
[3] Univ Gloucestershire, Sch Business Comp & Social Sci, Pk Campus, Gloucester GL50 2RH, England
[4] Monash Univ, Fac Informat Technol, Dept Data Sci & Artificial Intelligence, Clayton, Vic 3168, Australia
基金
新加坡国家研究基金会;
关键词
Banking trojan; Business sustainability; Cyber-attacks; Data privacy; Financial technology; BANKING; RANSOMWARE; BLOCKCHAIN; ATTACKS; TECHNOLOGY; INNOVATION; RISKS;
D O I
10.1016/j.eswa.2023.122697
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI) advancements have given rise to sophisticated cyber threats that traditional methods cannot counteract. Cyber threats are extremely critical in financial technology (FinTech) as a data-centric sector expected to provide 24/7 services. This paper introduces a novel and refined taxonomy of security threats in FinTech and conducts a comprehensive systematic review of defensive strategies. Through PRISMA methodology applied to 74 selected studies and topic modeling, we identified 11 central cyber threats, with 43 papers detailing them, and pinpointed 9 corresponding defense strategies, as covered in 31 papers. This in-depth analysis offers invaluable insights for stakeholders ranging from banks and enterprises to global governmental bodies, highlighting both the current challenges in FinTech and effective countermeasures, as well as directions for future research.
引用
收藏
页数:31
相关论文
共 138 条
  • [71] Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach
    Lee, Jaeung
    de Guzman, Melchor C.
    Wang, Jingguo
    Gupta, Manish
    Rao, H. Raghav
    [J]. COMPUTERS & SECURITY, 2022, 121
  • [72] Lee N., 2015, Cyber Attacks, Prevention, and Countermeasures BT - Counterterrorism and Cybersecurity: Total Information Awareness, P249, DOI DOI 10.1007/978-3-319-17244-6_10
  • [73] Lee R.M., 2016, ANAL CYBER ATTACK UK
  • [74] Blockchain from the information systems perspective: Literature review, synthesis, and directions for future research
    Lei, Chun Fong
    Ngai, Eric W. T.
    [J]. INFORMATION & MANAGEMENT, 2023, 60 (07)
  • [75] Event-based distributed state estimation for linear systems under unknown input and false data injection attack
    Li, Li
    Yang, Huan
    Xia, Yuanqing
    Yang, Hongjiu
    [J]. SIGNAL PROCESSING, 2020, 170
  • [76] Aligning social concerns with information system security: A fundamental ontology for social engineering
    Li, Tong
    Wang, Xiaowei
    Ni, Yeming
    [J]. INFORMATION SYSTEMS, 2022, 104
  • [77] A Review of False Data Injection Attacks Against Modern Power Systems
    Liang, Gaoqi
    Zhao, Junhua
    Luo, Fengji
    Weller, Steven R.
    Dong, Zhao Yang
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (04) : 1630 - 1638
  • [78] Generating scholarly content with ChatGPT: ethical challenges for medical publishing
    Liebrenz, Michael
    Schleifer, Roman
    Buadze, Anna
    Bhugra, Dinesh
    Smith, Alexander
    [J]. LANCET DIGITAL HEALTH, 2023, 5 (03): : E105 - E106
  • [79] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
    Madan, Sanjay
    Sofat, Sanjeev
    Bansal, Divya
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 9867 - 9888
  • [80] An empirical study on trust in mobile banking: A developing country perspective
    Malaquias, Rodrigo F.
    Hwang, Yujong
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2016, 54 : 453 - 461