Advertisement

Macroeconomic Model of Banking Digitization Process

  • Irina Toropova
  • Anna MingalevaEmail author
  • Pavel Knyazev
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 78)

Abstract

The widespread use of digitization in the field of credit and banking activities is based on the fact that it accelerates and reduces the cost of providing relevant services and also increases the security of operations for both banks and their customers. Among the most obvious advantages of banking digitization customers highlight the possibility of remote account management. However, this advantage is associated with serious problems. First of all, it is various embezzlement of funds from bank accounts also with the help of digital technologies, conducting fraudulent operations.

The aim of this research work is to analyze implications of credit and banking sector digitization through macroeconomic modeling.

A significant increase in the number of crimes committed with the help of digital devices and a multiple increase in the amount of damage from them were revealed in the article based on an empirical study. The cumulative negative impact of crimes committed with the help of digital technologies and digital devices was revealed not only on individual banks and the banking system as a whole, but also on the possibilities of the country’s social and economic development.

Keywords

Digitization of credit and banking sector Macroeconomic model Digital devices Computer crimes Credential theft 

References

  1. 1.
    Digital Banking Users to Reach nearly 3 billion by 2021, representing 1 in 2 global adult population. https://www.juniperresearch.com/press/press-releases/digital-banking-users-to-reach-nearly-3-billion-by. Last accessed 11 Feb 2019
  2. 2.
    Darvish, H., Husain, M.: Security analysis of mobile money applications on android. In: Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018, pp. 3072–3078. Seattle, United States (2019)Google Scholar
  3. 3.
    IBM Sponsored Study Finds Mobile App Developers Not Investing in Security IBM Security. https://www-03.ibm.com/press/us/en/pressrelease/46360.wss. Last accessed 1 Mar 2019
  4. 4.
    Khan, J., Abbas, H., Al-Muhtadi, J.: Survey on mobile user’s data privacy threats and defense mechanisms. Procedia Comput. Sci. 56(1), 376–383 (2015)CrossRefGoogle Scholar
  5. 5.
    Data Breach Investigations Report 2017. www.verizondigitalmedia.com/blog/2017/07/2017-verizon-data-breach-investigations-report. Last accessed 1 Mar 2019
  6. 6.
    Top 10 Mobile Risks OWASP Mobile Security Paper. https://www.apriorit.com/dev-blog/435-owasp-mobile-top-10-2017. Last accessed 1 Mar 2019
  7. 7.
    Reaves, B., Scaife, N., Bates, A., Traynor, P., Butler, K.R.: Mo (bile) money, mo (bile) problems: analysis of branchless banking applications. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 17–32. Washington, D.C. (2015)Google Scholar
  8. 8.
    Wazid, M., Zeadally, S., Das, A.K.: Mobile banking: evolution and threats: malware threats and security solutions. IEEE Consum. Electron. Mag. 8(2), 56–60 (2019)CrossRefGoogle Scholar
  9. 9.
    Kiljan, S., Simoens, K., De Cock, D., Van Eekelen, M., Vranken, H.: A survey of authentication and communications security in online banking. ACM Comput. Surv. 49(4), 61 (2016)CrossRefGoogle Scholar
  10. 10.
    Ghosh, S., Majumder, A., Goswami, J., Kumar, A., Mohanty, S.P., Bhattacharyya, B.K.: Swing-pay: one card meets all user payment and identity needs: a digital card module using NFC and biometric authentication for peer-to-peer payment. IEEE Consum. Electron. Mag. 6(1), 82–93 (2017)CrossRefGoogle Scholar
  11. 11.
    Mun, H., Han, K., Lee, Y.S., Yeun, C.Y., Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1–2), 214–222 (2012)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Xie, Q., Hu, B., Tan, X., Bao, M., Yu, X.: Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Pers. Commun. 74(2), 601–614 (2014)CrossRefGoogle Scholar
  13. 13.
    Zhao, D., Peng, H., Li, L., Yang, Y.: A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun. 78(1), 247–269 (2014)CrossRefGoogle Scholar
  14. 14.
    FinCoNet: Online and mobile payments: supervisory challenges to mitigate security risks (2016). www.finconet.org/FinCoNet_Report_Online_Mobile_Payments.pdf. Last accessed 4 Mar 2019
  15. 15.
    FinCoNet: Online and mobile payments: an overview of supervisory practices to mitigate security risks (2018). www.finconet.org/FinCoNet_SC3_Report_Online_Mobile_Payments_Supervisory_Practices_Security_Risks.pdf. Last accessed 4 Mar 2019
  16. 16.
    Sypachev, A.Y.: Basic methods of theft using the internet. Concept 10, art. no. 15349 (2015)Google Scholar
  17. 17.
    Esparza, J.M.: Understanding the credential theft lifecycle. Comput. Fraud Secur. 2, 6–9 (2019)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.GSEM, Ural Federal University Named After the First President of Russia B. N. YeltsinYekaterinburgRussia
  2. 2.FSBEI of HE “Ural State Economic University”YekaterinburgRussia

Personalised recommendations