Artificial intelligence, digital transformation and cybersecurity in the banking sector: A multi-stakeholder cognition-driven framework

被引:56
作者
Rodrigues, Ana Rita D. [1 ]
Ferreira, Fernando A. F. [2 ,3 ]
Teixeira, Fernando J. C. S. N. [4 ]
Zopounidis, Constantin [5 ,6 ]
机构
[1] Univ Inst Lisbon, ISCTE Business Sch, Ave Forcas Armadas, P-1649026 Lisbon, Portugal
[2] Univ Inst Lisbon, ISCTE Business Sch, BRU IUL, Ave Forcas Armadas, P-1649026 Lisbon, Portugal
[3] Univ Memphis, Fogelman Coll Business & Econ, Memphis, TN 38152 USA
[4] Polytech Inst Beja, Sch Technol & Management, Rua Pedro Soares, P-7800295 Beja, Portugal
[5] Tech Univ Crete, Sch Prod Engn & Management, Univ Campus, Khania 73100, Greece
[6] Audencia Business Sch, Inst Finance, 8 Route Joneliere, F-44312 Nantes, France
关键词
Artificial intelligence (AI); Cognitive mapping; Cybersecurity; Decision making trial and evaluation laboratory (DEMATEL); Digital transformation; PROBLEM STRUCTURING METHODS; BIG DATA; DEMATEL; STRATEGY;
D O I
10.1016/j.ribaf.2022.101616
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
Traditional banking institutions are currently under great pressure from their stakeholders to adapt to new technologies. However, due to this sector's inherent nature, data security cannot be jeopardized. Users must place great trust in their bank branches-a necessary feature of relationships between banking institutions and their clients. Banks' reputation also directly affects their success, ability to attract new customers, and retention of existing ones. These issues mean that making decisions regarding how to deal with the challenges of incorporating artificial intelligence (AI), digital transformation and cybersecurity into the banking sector is quite complex. This study sought to develop a realistic decision-support model by combining cognitive mapping and the decision-making trial and evaluation laboratory (DEMATEL) method in order to address this topic. Group sessions with an expert panel were conducted to apply the methodological procedures, thereby allowing realism to be incorporated into the final results.
引用
收藏
页数:15
相关论文
共 84 条
[1]   Problem structuring methods 'in the Dock': Arguing the case for Soft OR [J].
Ackermann, Fran .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2012, 219 (03) :652-658
[2]   BBVA's Data Monetization Journey [J].
Alfaro, Elena ;
Bressan, Marco ;
Girardin, Fabien ;
Murillo, Juan ;
Someh, Ida ;
Wixom, Barbara H. .
MIS QUARTERLY EXECUTIVE, 2019, 18 (02) :117-128
[3]   Passive- and not active-risk tendencies predict cyber security behavior [J].
Arend, Isabel ;
Shabtai, Asaf ;
Idan, Tali ;
Keinan, Ruty ;
Bereby-Meyer, Yoella .
COMPUTERS & SECURITY, 2020, 96
[4]   Analyzing the dynamics behind ethical banking practices using fuzzy cognitive mapping [J].
Azevedo, Ana Rita S. C. ;
Ferreira, Fernando A. F. .
OPERATIONAL RESEARCH, 2019, 19 (03) :679-700
[5]   Authentication systems: A literature review and classification [J].
Barkadehi, Mohammadreza Hazhirpasand ;
Nilashi, Mehrbaksh ;
Ibrahim, Othman ;
Fardi, Ali Zakeri ;
Samad, Sarminah .
TELEMATICS AND INFORMATICS, 2018, 35 (05) :1491-1511
[6]   Cybersecurity: Stakeholder incentives, externalities, and policy options [J].
Bauer, Johannes M. ;
van Eeten, Michel J. G. .
TELECOMMUNICATIONS POLICY, 2009, 33 (10-11) :706-719
[7]  
Begley T., 2019, SMALL BANK LENDING A
[8]   Groups and facilitators within problem structuring processes [J].
Bell, S. ;
Morse, S. .
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2013, 64 (07) :959-972
[9]  
Belton Valerie., 2002, Multiple Criteria Decision Analysis: An Integrated Approach, DOI DOI 10.1007/978-1-4615-1495-4
[10]   Effects of cyber security knowledge on attack detection [J].
Ben-Asher, Noam ;
Gonzalez, Cleotilde .
COMPUTERS IN HUMAN BEHAVIOR, 2015, 48 :51-61